Your success in GIAC GCIA is our sole target and we develop all our GCIA braindumps in a way that facilitates the attainment of this target. Not only is our GCIA study material the best you can find, it is also the most detailed and the most updated. GCIA Practice Exams for GIAC GCIA are written to the highest standards of technical accuracy.

Also have GCIA free dumps questions for you:

NEW QUESTION 1
Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?

  • A. SAX
  • B. Persistent
  • C. Document Object Model (DOM)
  • D. Non persistent

Answer: B

NEW QUESTION 2
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.

  • A. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized acces
  • B. These are the threats that originate from within the organizatio
  • C. These are the threats intended to flood a network with large volumes of access request
  • D. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Interne

Answer: ACD

NEW QUESTION 3
Which of the following is the default port for Simple Network Management Protocol (SNMP)?

  • A. TCP port 110
  • B. TCP port 25
  • C. TCP port 80
  • D. UDP port 161

Answer: D

NEW QUESTION 4
What is the maximum size of an IP datagram for Ethernet?

  • A. 4500 bytes
  • B. 1024 bytes
  • C. 1200 bytes
  • D. 1500 bytes

Answer: D

NEW QUESTION 5
Which of the following wireless security features provides the best wireless security mechanism?

  • A. WPA
  • B. WPA with Pre Shared Key
  • C. WPA with 802.1X authentication
  • D. WEP

Answer: C

NEW QUESTION 6
HOTSPOT
You work as a Network Administrator for McRobert Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You are configuring intrusion detection on the server. You want to get notified when a TCP SYN packet is sent with a spoofed source IP address and port number that match the destination IP address and port number. Mark the alert that you will enable on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box to accomplish the task.
GCIA dumps exhibit


Solution:
GCIA dumps exhibit

Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 7
John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

  • A. Rainbow attack
  • B. DoS attack
  • C. ARP spoofing
  • D. Replay attack

Answer: B

NEW QUESTION 8
Which of the following file systems is designed by Sun Microsystems?

  • A. NTFS
  • B. CIFS
  • C. ZFS
  • D. ext2

Answer: C

NEW QUESTION 9
Which of the following terms describes an attempt to transfer DNS zone data?

  • A. Reconnaissance
  • B. Encapsulation
  • C. Dumpster diving
  • D. Spam

Answer: A

NEW QUESTION 10
Which of the following protocols does IPsec use to perform various security functions in the network?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Encapsulating Security Payload
  • B. Internet Key Exchange
  • C. Skinny Client Control Protocol
  • D. Authentication Header

Answer: ABD

NEW QUESTION 11
Which of the following is the best method of accurately identifying the services running on a victim host?

  • A. Use of hit and trial method to guess the services and ports of the victim hos
  • B. Use of a port scanner to scan each port to confirm the services runnin
  • C. Use of a vulnerability scanner to try to probe each port to verify which service is runnin
  • D. Use of the manual method of telnet to each of the open port

Answer: D

NEW QUESTION 12
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

  • A. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer
  • B. Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer
  • C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
  • D. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

Answer: A

NEW QUESTION 13
Which of the following Linux/UNIX commands is used to delete files permanently so that the files cannot be recovered?

  • A. del
  • B. shred
  • C. erase
  • D. rm

Answer: B

NEW QUESTION 14
Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

  • A. Fpipe
  • B. tcptraceroute
  • C. Sniffer
  • D. tcptrace

Answer: D

NEW QUESTION 15
An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network. Which of the following processes does an IDS perform?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Network traffic analysis
  • B. Event log analysis
  • C. Monitoring and analysis of user and system activity
  • D. Statistical analysis of abnormal traffic patterns

Answer: ABCD

NEW QUESTION 16
Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

  • A. DriveSpy
  • B. Ontrack
  • C. Device Seizure
  • D. Forensic Sorter

Answer: A

NEW QUESTION 17
Which of the following commands will you use with the tcpdump command to display the contents of the packets?

  • A. tcpdump -q
  • B. tcpdump -v
  • C. tcpdump -n
  • D. tcpdump –A

Answer: D

NEW QUESTION 18
Which of the following tools can be used for passive OS fingerprinting?

  • A. dig
  • B. nmap
  • C. ping
  • D. tcpdump

Answer: D

NEW QUESTION 19
Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

  • A. Man trap
  • B. Network Intrusion Detection System (NIDS)
  • C. Biometric device
  • D. Host Intrusion Detection System (HIDS)

Answer: A

NEW QUESTION 20
In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

  • A. Fragmentation overlap attack
  • B. Evasion attack
  • C. Fragmentation overwrite attack
  • D. Insertion attack

Answer: D

NEW QUESTION 21
......

P.S. Easily pass GCIA Exam with 508 Q&As Certshared Dumps & pdf Version, Welcome to Download the Newest Certshared GCIA Dumps: https://www.certshared.com/exam/GCIA/ (508 New Questions)