GCIA Exam Questions - Online Test


GCIA Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Our pass rate is high to 98.9% and the similarity percentage between our GCIA study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the GIAC GCIA exam in just one try? I am currently studying for the GIAC GCIA exam. Latest GIAC GCIA Test exam practice questions and answers, Try GIAC GCIA Brain Dumps First.

Online GCIA free questions and answers of New Version:

NEW QUESTION 1
At which port does a DHCPv6 client listen for DHCP messages?

  • A. TCP port 546
  • B. TCP port 547
  • C. UDP port 546
  • D. UDP port 547

Answer: C

NEW QUESTION 2
Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

  • A. Logical Link control and Media Access control
  • B. Logical control and Link control
  • C. Machine Link control and Logical Link control
  • D. Data control and Media Access control

Answer: A

NEW QUESTION 3
Which of the following commands displays the IPX routing table entries?

  • A. sh ipx traffic
  • B. sh ipx int e0
  • C. sh ipx route
  • D. sho ipx servers

Answer: C

NEW QUESTION 4
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.

  • A. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized acces
  • B. These are the threats that originate from within the organizatio
  • C. These are the threats intended to flood a network with large volumes of access request
  • D. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Interne

Answer: ACD

NEW QUESTION 5
Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes.
On the basis of above information, which of the following types of attack is Adam attempting to perform?

  • A. Fraggle attack
  • B. SYN Flood attack
  • C. Land attack
  • D. Ping of death attack

Answer: D

NEW QUESTION 6
Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.

  • A. TRACERT
  • B. Ping
  • C. IPCONFIG
  • D. Netstat

Answer: AB

NEW QUESTION 7
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. You have recently come to know about the Slammer worm, which attacked computers in 2003 and doubled the number of infected hosts every 9 seconds or so. Slammer infected 75000 hosts in the first 10 minutes of the attack. To mitigate such security threats, you want to configure security tools on the network. Which of the following tools will you use?

  • A. Intrusion Prevention Systems
  • B. Firewall
  • C. Intrusion Detection Systems
  • D. Anti-x

Answer: A

NEW QUESTION 8
Which of the following distributes incorrect IP address to divert the traffic?

  • A. IP spoofing
  • B. Domain name server (DNS) poisoning
  • C. Reverse Address Resolution Protocol
  • D. Route table poisoning

Answer: B

NEW QUESTION 9
Which of the following firewalls keeps track of the state of network connections traveling across the network?

  • A. Stateful firewall
  • B. Application-level firewall
  • C. Packet filtering firewall
  • D. Circuit-level firewall

Answer: A

NEW QUESTION 10
Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?

  • A. Cache memory test failed
  • B. Mother board timer not operational
  • C. Display memory error
  • D. Processor failure

Answer: D

NEW QUESTION 11
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network. You are configuring an Internet connection on a server. Which of the following servers filters outbound Web traffic on the network?

  • A. Proxy server
  • B. DNS server
  • C. WINS server
  • D. DHCP server

Answer: A

NEW QUESTION 12
________ is a command-line tool that can check the DNS registration of a domain controller.

  • A. NBTSTAT
  • B. NETSH
  • C. DNSCMD
  • D. DCDIAG

Answer: D

NEW QUESTION 13
You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

  • A. The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enable
  • B. The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selecte
  • C. The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enable
  • D. The Enable Intrusion detection check box on the General tab page of the IP Packet Filters Properties dialog box is not selecte

Answer: D

NEW QUESTION 14
Which of the following statements about a host-based intrusion prevention system (HIPS) are true?
Each correct answer represents a complete solution. Choose two.

  • A. It can detect events scattered over the networ
  • B. It can handle encrypted and unencrypted traffic equall
  • C. It cannot detect events scattered over the networ
  • D. It is a technique that allows multiple computers to share one or more IP addresse

Answer: BC

NEW QUESTION 15
Which of the following protocols is used by TFTP as a file transfer protocol?

  • A. UDP
  • B. SNMP
  • C. TCP
  • D. SMTP

Answer: A

NEW QUESTION 16
......

Recommend!! Get the Full GCIA dumps in VCE and PDF From Certshared, Welcome to Download: https://www.certshared.com/exam/GCIA/ (New 508 Q&As Version)