Master the GCIA GIAC Certified Intrusion Analyst content and be ready for exam day success quickly with this Pass4sure GCIA free draindumps. We guarantee it!We make it a reality and give you real GCIA questions in our GIAC GCIA braindumps.Latest 100% VALID GIAC GCIA Exam Questions Dumps at below page. You can use our GIAC GCIA braindumps and pass your exam.
Online GIAC GCIA free dumps demo Below:
NEW QUESTION 1
You work as a Security Professional for CertLeader Inc. The company has a Linux-based network. You want to analyze the network traffic with Snort. You run the following command:
snort -v -i eth 0
Which of the following information will you get using the above command?
Each correct answer represents a complete solution. Choose all that apply.
- A. Protocol statistics
- B. Date stamp on the packets
- C. Number of packets received and dropped
- D. Application layer data
Answer: ABC
NEW QUESTION 2
Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?
- A. Brute Force attack
- B. Hybrid attack
- C. Dictionary attack
- D. Rainbow attack
Answer: D
NEW QUESTION 3
By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?
Each correct answer represents a complete solution. Choose all that apply.
- A. By launching Sequence++ attack
- B. Route table poisoning
- C. By launching Social Engineering attack
- D. By launching Max Age attack
Answer: ABD
NEW QUESTION 4
Which of the following is the unspecified address in IPv6?
- A. 1:1:1:1:1:1:1:1
- B. 0:0:0:0:0:0:0:0
- C. 0:0:0:0:0:0:0:1
- D. 1:0:0:0:0:0:0:0
Answer: B
NEW QUESTION 5
Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?
Each correct answer represents a complete solution. Choose all that apply.
- A. Close existing email account and open new email accoun
- B. Forward a copy of the spam to the ISP to make the ISP conscious of the spa
- C. Report the incident to the FTC (The U.
- D. Federal Trade Commission) by sending a copy of the spam messag
- E. Send an email to the domain administrator responsible for the initiating IP addres
Answer: BC
NEW QUESTION 6
Trinity wants to send an email to her friend. She uses the MD5 generator to calculate cryptographic hash of her email to ensure the security and integrity of the email. MD5 generator, which Trinity is using operates in two steps:
Creates check file
Verifies the check file
Which of the following MD5 generators is Trinity using?
- A. Secure Hash Signature Generator
- B. Mat-MD5
- C. Chaos MD5
- D. MD5 Checksum Verifier
Answer: D
NEW QUESTION 7
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.
- A. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Interne
- B. These are the threats intended to flood a network with large volumes of access request
- C. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized acces
- D. These are the threats that originate from within the organizatio
Answer: ABC
NEW QUESTION 8
Which of the following commands is a Packet sniffer?
- A. tcpdump
- B. strace
- C. nmap
- D. tail
Answer: A
NEW QUESTION 9
Which of the following is the default port used by Simple Mail Transfer Protocol (SMTP)?
- A. 80
- B. 25
- C. 20
- D. 21
Answer: B
NEW QUESTION 10
Which of the following is a valid IPv6 address?
- A. 45C
- B. 6D53: 12C
- C. AFC7: E654: BB32: 54AT: FACE
- D. 45C
- E. 6D53: 12KP: AFC7: E654: BB32: 543
- F. FACE
- G. 123.111.243.123
- H. 45C
- I. 6D53: 12C
- J. AFC7: E654: BB32: 543
- K. FACE
Answer: D
NEW QUESTION 11
Who are the primary victims of smurf attacks on the contemporary Internet system?
- A. FTP servers are the primary victim to smurf attacks
- B. IRC servers are the primary victim to smurf attacks
- C. SMTP servers are the primary victim to smurf attacks
- D. Mail servers are the primary victim to smurf attacks
Answer: B
NEW QUESTION 12
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has written the following snort signature:
Which of the following statements about this snort signature is true?
- A. It detects the session splicing IDS evasion attac
- B. It detects AOL IM cha
- C. It detects Yahoo IM cha
- D. It detects the bad file attachments coming to the mail serve
Answer: D
NEW QUESTION 13
Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.
Peter's manager suspects that someone is trying to log in to his computer in his absence. Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the users who have last logged in to the manager's system?
Each correct answer represents a complete solution. Choose two.
- A. lastb
- B. pwd
- C. last
- D. rwho -a
Answer: AC
NEW QUESTION 14
Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.
The tool uses raw IP packets to determine the following:
What ports are open on our network systems.
What hosts are available on the network.
Identify unauthorized wireless access points.
What services (application name and version) those hosts are offering.
What operating systems (and OS versions) they are running.
What type of packet filters/firewalls are in use.
Which of the following tools is Victor using?
- A. Nessus
- B. Nmap
- C. Sniffer
- D. Kismet
Answer: B
NEW QUESTION 15
You work as a Network Administrator for Tech2tech Inc. You have configured a network-based IDS for your company.
You have physically installed sensors at all key positions throughout the network such that they all report to the command console.
What will be the key functions of the sensors in such a physical layout?
Each correct answer represents a complete solution. Choose all that apply.
- A. To collect data from operating system logs
- B. To notify the console with an alert if any intrusion is detected
- C. To analyze for known signatures
- D. To collect data from Web servers
Answer: BC
NEW QUESTION 16
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer. You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?
- A. start /w ocsetup DnsServercorerole
- B. net start "dns server"
- C. start /w ocsetup DNS-Server-Core-Role
- D. start /w ocsetup DnsServer
Answer: C
NEW QUESTION 17
Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. Choose all that apply.
- A. Limiting the amount of network bandwidth
- B. Blocking IP address
- C. Using LM hashes for passwords
- D. Using Intrusion detection systems
- E. Using the network-ingress filtering
Answer: ABDE
NEW QUESTION 18
Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?
Each correct answer represents a complete solution. Choose two.
- A. Attacker can use the Ping Flood DoS attack if WZC is use
- B. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain acces
- C. It will not allow the configuration of encryption and MAC filterin
- D. Sending information is not secure on wireless networ
- E. Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain acces
Answer: BD
NEW QUESTION 19
Which of the following statements is NOT true about the file slack spaces in Windows operating system?
- A. File slack is the space, which exists between the end of the file and the end of the last clust e
- B. Large cluster size will decrease the volume of the file slac
- C. File slack may contain data from the memory of the syste
- D. It is possible to find user names, passwords, and other important information in slac
Answer: B
NEW QUESTION 20
Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. Choose all that apply.
- A. For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresse
- B. It increases the number of available IP addresse
- C. It provides improved authentication and securit
- D. It uses 128-bit addresse
- E. It uses longer subnet masks than those used in IPv4.
Answer: ABCD
NEW QUESTION 21
......
Recommend!! Get the Full GCIA dumps in VCE and PDF From Thedumpscentre.com, Welcome to Download: https://www.thedumpscentre.com/GCIA-dumps/ (New 508 Q&As Version)