GCIA Exam Questions - Online Test


GCIA Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Proper study guides for Most up-to-date GIAC GIAC Certified Intrusion Analyst certified begins with GIAC GCIA preparation products which designed to deliver the Tested GCIA questions by making you pass the GCIA test at your first time. Try the free GCIA demo right now.

Free GCIA Demo Online For GIAC Certifitcation:

NEW QUESTION 1
Adam works as a Security Analyst for Umbrella Inc. He is performing real-time traffic analysis on IP networks using Snort. Adam is facing problems in analyzing intrusion data. Which of the following software combined with Snort can Adam use to get a visual representation of intrusion data?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Basic Analysis and Security Engine (BASE)
  • B. sguil
  • C. KFSensor
  • D. OSSIM

Answer: ABD

NEW QUESTION 2
Which of the following is NOT the primary type of firewall?

  • A. Network firewall
  • B. Proxy based firewall
  • C. Stateful inspection firewall
  • D. Packet filter firewall

Answer: A

NEW QUESTION 3
Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police.
A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

  • A. Linux
  • B. Mac OS
  • C. MINIX 3
  • D. Windows XP

Answer: B

NEW QUESTION 4
Which of the following port numbers are valid ephemeral port numbers?
Each correct answer represents a complete solution. Choose two.

  • A. 143
  • B. 1025
  • C. 161
  • D. 1080

Answer: BD

NEW QUESTION 5
Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

  • A. Logical control and Link control
  • B. Data control and Media Access control
  • C. Machine Link control and Logical Link control
  • D. Logical Link control and Media Access control

Answer: D

NEW QUESTION 6
Which of the following tables is formed by NTFS file system to keep the track of files, to store metadata, and their location?

  • A. The Master File Table
  • B. The System File Table
  • C. The Master Allocation Table
  • D. The File Allocation Table

Answer: A

NEW QUESTION 7
Which of the following protocols is used by e-mail servers to send messages?

  • A. SNMP
  • B. FTP
  • C. POP3
  • D. SMTP
  • E. HTTP

Answer: D

NEW QUESTION 8
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

  • A. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer
  • B. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer
  • C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
  • D. Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

Answer: A

NEW QUESTION 9
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

  • A. FAU
  • B. FTK Imager
  • C. Galleta
  • D. Device Seizure

Answer: D

NEW QUESTION 10
Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. Choose all that apply.

  • A. For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresse
  • B. It increases the number of available IP addresse
  • C. It provides improved authentication and securit
  • D. It uses 128-bit addresse
  • E. It uses longer subnet masks than those used in IPv4.

Answer: ABCD

NEW QUESTION 11
You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows Server 2008 member servers and 120 Windows Vista client computers. You are implementing a caching-only DNS server on one of the member servers. Your assistant wants to know about the caching-only DNS server. Which of the following statements about the caching-only DNS server are correct?
Each correct answer represents a complete solution. Choose three.

  • A. It hosts zones and authoritative for a particular domai
  • B. It reduces the amount of DNS traffic on a Wide Area Network (WAN)
  • C. It is useful at a site where DNS functionality is needed locally but there is not a requirement for a separate domain for that locatio
  • D. It performs queries, caches the answers, and returns the result

Answer: BCD

NEW QUESTION 12
Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?

  • A. D
  • B. N
  • C. Z
  • D. C

Answer: B

NEW QUESTION 13
You work as a Network Administrator for Tech2tech Inc. You have configured a network-based IDS for your company.
You have physically installed sensors at all key positions throughout the network such that they all report to the command console.
What will be the key functions of the sensors in such a physical layout?
Each correct answer represents a complete solution. Choose all that apply.

  • A. To collect data from operating system logs
  • B. To notify the console with an alert if any intrusion is detected
  • C. To analyze for known signatures
  • D. To collect data from Web servers

Answer: BC

NEW QUESTION 14
Which of the following activities will you use to retrieve user names, and info on groups, shares, and services of networked computers?

  • A. Network tap
  • B. Packet crafting
  • C. Network mapping
  • D. Network enumerating

Answer: D

NEW QUESTION 15
Which of the following techniques is used to identify attacks originating from a botnet?

  • A. IFilter
  • B. BPF-based filter
  • C. Passive OS fingerprinting
  • D. Recipient filtering

Answer: C

NEW QUESTION 16
......

P.S. Easily pass GCIA Exam with 508 Q&As Dumpscollection.com Dumps & pdf Version, Welcome to Download the Newest Dumpscollection.com GCIA Dumps: https://www.dumpscollection.net/dumps/GCIA/ (508 New Questions)