Exam Code: GCIA (Practice Exam Latest Test Questions VCE PDF)
Exam Name: GIAC Certified Intrusion Analyst
Certification Provider: GIAC
Free Today! Guaranteed Training- Pass GCIA Exam.

Free demo questions for GIAC GCIA Exam Dumps Below:

NEW QUESTION 1
Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

  • A. CHKDSK /I
  • B. CHKDSK /R /F
  • C. CHKDSK /C /L
  • D. CHKDSK /V /X

Answer: B

NEW QUESTION 2
Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to add a DNS server to a list of DNS servers for a specified interface?

  • A. net dnsserver
  • B. add address
  • C. add dnsserver
  • D. add neighbors

Answer: C

NEW QUESTION 3
Which of the following types of firewall functions at the Session layer of OSI model?

  • A. Circuit-level firewall
  • B. Switch-level firewall
  • C. Packet filtering firewall
  • D. Application-level firewall

Answer: A

NEW QUESTION 4
Which of the following networks relies on the tunneling protocol?

  • A. Wide Area Network (WAN)
  • B. Virtual Private Network (VPN)
  • C. Local Area Network (LAN)
  • D. Wireless Network

Answer: B

NEW QUESTION 5
You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer. While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command. What is the cause of the issue?

  • A. Core Networking Firewall rules do not allow IPv4 or IPv6.
  • B. Windows Firewall rules do not allow Core Networking Tool
  • C. Windows Firewall blocks the command line tool
  • D. Core Networking Firewall rules do not allow ICMPv4 or ICMPv6 Echo Request

Answer: D

NEW QUESTION 6
Which of the following standard file formats is used by Apple's iPod to store contact information?

  • A. HFS+
  • B. vCard
  • C. FAT32
  • D. hCard

Answer: B

NEW QUESTION 7
Which of the following commands will you use to display ARP packets in the snort-output?

  • A. snort -v -i eth 0
  • B. snort -d -v -i eth 0
  • C. snort -dev -i eth 0
  • D. snort -deva -i eth 0

Answer: D

NEW QUESTION 8
Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?
Each correct answer represents a complete solution. Choose all that apply.

  • A. All ideas present in the investigative report should flow logically from facts to conclusion
  • B. Opinion of a lay witness should be included in the investigative repor
  • C. The investigative report should be understandable by any reade
  • D. There should not be any assumptions made about any facts while writing the investigative repor

Answer: ACD

NEW QUESTION 9
Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

  • A. Propagating Cipher Block Chaining (PCBC) Mode
  • B. Cipher Block Chaining (CBC) Mode
  • C. Electronic Codebook (ECB) Mode
  • D. Cipher Feedback (CFB) Mode

Answer: B

NEW QUESTION 10
You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You configure intrusion detection on the server. Which of the following alerts notifies that repeated attempts to a destination computer are being made and no corresponding ACK (acknowledge) packet is being communicated?

  • A. IP half scan attack
  • B. UDP bomb attack
  • C. Land attack
  • D. Ping of death attack

Answer: A

NEW QUESTION 11
Which of the following is a hardware/software platform that is designed to analyze, detect, and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

  • A. NIPS
  • B. HIPS
  • C. NIDS
  • D. HIDS

Answer: A

NEW QUESTION 12
Which of the following OSI layers is responsible for protocol conversion, data encryption/decryption, and data compression?

  • A. Network layer
  • B. Data-link layer
  • C. Presentation layer
  • D. Transport layer

Answer: C

NEW QUESTION 13
Which of the following techniques is used to log network traffic?

  • A. Cracking
  • B. IP address spoofing
  • C. Tunneling
  • D. Sniffing

Answer: D

NEW QUESTION 14
Which of the following DNS resource records is used to resolve a host name to an IPv6 address?

  • A. AAAA
  • B. HINFO
  • C. CNAME
  • D. A

Answer: A

NEW QUESTION 15
Which of the following statements are true about routers?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Routers do not limit physical broadcast traffi
  • B. Routers organize addresses into classes, which are used to determine how to move packets from one network to anothe
  • C. Routers act as protocol translators and bind dissimilar network
  • D. Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follo

Answer: BCD

NEW QUESTION 16
Which of the following tools can be used to check whether the network interface is in promiscuous mode or not?

  • A. IPTraf
  • B. MRTG
  • C. Chkrootkit
  • D. Ntop

Answer: C

NEW QUESTION 17
Which of the following are not functions of the SNORT application?
Each correct answer represents a complete solution. Choose two.

  • A. Packet logging
  • B. Virus detection
  • C. Hard disk drive scanning
  • D. Packet sniffing
  • E. Intrusion detection

Answer: BC

NEW QUESTION 18
Which of the following tools is used to locate lost files and partitions to restore data from a formatted, damaged, or lost partition in Windows and Apple Macintosh computers?

  • A. Easy-Undelete
  • B. VirtualLab
  • C. File Scavenger
  • D. Recover4all Professional

Answer: B

NEW QUESTION 19
John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

  • A. Insertion attack
  • B. Session splicing attack
  • C. Evasion attack
  • D. Polymorphic shell code attack

Answer: D

NEW QUESTION 20
Which of the following statements best describes the string matching method of signature analysis?

  • A. String matching searches specific strings that may indicate an attac
  • B. String matching examines multiple fields from different protocols, such as source address, destination port, or TCP flag
  • C. In string matching, each packet is wrapped in predefined layers of different protocol
  • D. In string matching, an incoming packet is compared, byte by byte, with a single signature, a string of cod

Answer: D

NEW QUESTION 21
......

Recommend!! Get the Full GCIA dumps in VCE and PDF From Dumpscollection.com, Welcome to Download: https://www.dumpscollection.net/dumps/GCIA/ (New 508 Q&As Version)