GCIA Exam Questions - Online Test


GCIA Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

It is impossible to pass GIAC GCIA exam without any help in the short term. Come to Exambible soon and find the most advanced, correct and guaranteed GIAC GCIA practice questions. You will get a surprising result by our Most up-to-date GIAC Certified Intrusion Analyst practice guides.

Online GCIA free questions and answers of New Version:

NEW QUESTION 1
Which of the following ports is used by Layer 2 Tunneling Protocol (L2TP)?

  • A. UDP port 1701
  • B. UDP port 67
  • C. TCP port 23
  • D. TCP port 25

Answer: A

NEW QUESTION 2
You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command. Which of the following commands will you use?

  • A. ping -a
  • B. ping -l
  • C. ping -t
  • D. ping –n

Answer: C

NEW QUESTION 3
You work as a network administrator for BlueWell Inc. You have to convert your 48-bit host address (MAC address) to an IPv6 54-bit address. Using the IEEE-EUI-64 conversion process, how do you convert the 48-bit host address (MAC address) to an IPv6 54-bit address?

  • A. Add E
  • B. FE between the third and fourth byte
  • C. Add F
  • D. EE between the third and fourth byte
  • E. Add F
  • F. EE between the third and fourth byte
  • G. Add F
  • H. FE between the third and fourth bytes

Answer: D

NEW QUESTION 4
Which of the following fields of the IPv6 header is similar to the TTL field of IPv4?

  • A. Hop Limit
  • B. Next Header
  • C. Flow Label
  • D. Traffic Class

Answer: A

NEW QUESTION 5
Which of the following monitors program activities and modifies malicious activities on a system?

  • A. Back door
  • B. RADIUS
  • C. HIDS
  • D. NIDS

Answer: C

NEW QUESTION 6
You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?

  • A. ping -a
  • B. ping -4
  • C. ping -t
  • D. ping –l

Answer: D

NEW QUESTION 7
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system. Which of the following files will Adam investigate to accomplish the task?

  • A. /boot/grub/menu.lst
  • B. /grub/grub.com
  • C. /boot/boot.conf
  • D. /boot/grub/grub.conf

Answer: A

NEW QUESTION 8
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

  • A. Signature-based
  • B. Network-based
  • C. File-based
  • D. Anomaly-based

Answer: D

NEW QUESTION 9
Routers work at which layer of the OSI reference model?

  • A. Transport
  • B. Physical
  • C. Presentation
  • D. Network

Answer: D

NEW QUESTION 10
Adam works as a Security administrator for Umbrella Inc. He runs the following traceroute and notice that hops 19 and 20 both show the same IP address.
* 1 172.16.1.254 (172.16.1.254) 0.724 ms 3.285 ms 0.613 ms 2 ip68-98-176-1.nv.nv.cox.net (68.98.176.1) 12.169 ms 14.958 ms 13.416 ms 3 ip68-98-176-1.nv.nv.cox.net (68.98.176.1) 13.948 ms ip68-100-0-1.nv.nv. cox.net (68.100.0.1) 16.743 ms 16.207 ms 4 ip68-100-0-137.nv.nv.cox.net (68.100.0.137) 17.324 ms 13.933 ms 20.938 ms 5 68.1.1.4 (68.1.1.4) 12.439 ms 220.166 ms 204.170 ms 6 so-6-0-0.gar2.wdc1.Level3.net (67.29.170.1) 16.177 ms 25.943 ms 14.104 ms 7 unknown.Level3.net (209.247.9.173) 14.227 ms 17.553 ms 15.415 ms "CertLeader" -8 so-0-1-0.bbr1.NewYork1.level3.net (64.159.1.41) 17.063 ms 20.960 ms 19.512 ms 9 so-7-0-0.gar1. NewYork1.Level3.net (64.159.1.182) 20.334 ms 19.440 ms 17.938 ms 10 so-4-0-0.edge1.NewYork1.Level3. net (209.244.17.74) 27.526 ms 18.317 ms 21.202 ms 11 uunet-level3-oc48.NewYork1.Level3.net
(209.244.160.12) 21.411 ms 19.133 ms 18.830 ms 12 0.so-6-0-0.XL1.NYC4.ALTER.NET
(152.63.21.78)
* 21.203 ms 22.670 ms 20.111 ms 13 0.so-2-0-0.TL1.NYC8.ALTER.NET (152.63.0.153)
* 30.929 ms 24.858 ms
* 23.108 ms 14 0.so-4-1-0.TL1.ATL5.ALTER.NET (152.63.10.129) 37.894 ms 33.244 ms
* 33.910 ms 15 0.so-7-0-0.XL1.MIA4.ALTER.NET (152.63.86.189) 51.165 ms 49.935 ms
* 49.466 ms 16 0.so-3-0-0.XR1.MIA4.ALTER.
NET (152.63.101.41) 50.937 ms 49.005 ms 51.055 ms 17 117.ATM6-
* 0.GW5.MIA1.ALTER.NET (152.63.82.73) 51.897 ms 50.280 ms 53.647 ms 18 CertLeadergw1.
customer.alter.net (65.195.239.14) 51.921 ms 51.571 ms 56.855 ms 19
www.CertLeader.com (65.195.239.22) 52.191 ms 52.571 ms 56.855 ms 20
www.CertLeader.com (65.195.239.22) 53.561 ms 54.121 ms 58.333 ms
Which of the following is the most like cause of this issue?

  • A. Intrusion Detection System
  • B. An application firewall
  • C. Network Intrusion system
  • D. A stateful inspection firewall

Answer: D

NEW QUESTION 11
Which of the following encryption methods are used by the BlackBerry to provide security to the data stored in it?
Each correct answer represents a complete solution. Choose two.

  • A. Triple DES
  • B. Blowfish
  • C. AES
  • D. RSA

Answer: AC

NEW QUESTION 12
An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network. Which of the following processes does an IDS perform?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Network traffic analysis
  • B. Event log analysis
  • C. Monitoring and analysis of user and system activity
  • D. Statistical analysis of abnormal traffic patterns

Answer: ABCD

NEW QUESTION 13
Which of the following tools is used to detect round-robin-load-balancing?

  • A. traceroute
  • B. tcptrace
  • C. TCP SYN scanning
  • D. tcptraceroute

Answer: D

NEW QUESTION 14
Which of the following partitions contains the system files that are used to start the operating system?

  • A. Boot partition
  • B. System partition
  • C. Secondary partition
  • D. Primary partition

Answer: A

NEW QUESTION 15
What is the function of TRACERT utility?

  • A. Trace the path taken by TCP/IP packets to a remote compute
  • B. Provide the host name of the routing devic
  • C. Trace the MAC address of the target host's network adapte
  • D. Provide DNS server addres

Answer: A

NEW QUESTION 16
......

Thanks for reading the newest GCIA exam dumps! We recommend you to try the PREMIUM Dumps-hub.com GCIA dumps in VCE and PDF here: https://www.dumps-hub.com/GCIA-dumps.html (508 Q&As Dumps)