2023 New GCIA Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/GCIA/

Want to know Certleader GCIA Exam practice test features? Want to lear more about GIAC GIAC Certified Intrusion Analyst certification experience? Study 100% Correct GIAC GCIA answers to Improve GCIA questions at Certleader. Gat a success with an absolute guarantee to pass GIAC GCIA (GIAC Certified Intrusion Analyst) test on your first attempt.

Check GCIA free dumps before getting the full version:

NEW QUESTION 1
Which of the following is an example of penetration testing?

  • A. Implementing HIDS on a computer
  • B. Simulating an actual attack on a network
  • C. Implementing NIDS on a network
  • D. Configuring firewall to block unauthorized traffic

Answer: B

NEW QUESTION 2
John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  • A. SARA
  • B. Snort
  • C. Samhain
  • D. Tripwire

Answer: BC

NEW QUESTION 3
Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

  • A. E-mail spoofing
  • B. E-mail bombing
  • C. E-mail Storm
  • D. E-mail Spam

Answer: D

NEW QUESTION 4
Which of the following DoS attacks points the Central Processing Unit (CPU) to a non-existent memory location causing the running process to end abruptly?

  • A. Buffer Overflow attack
  • B. Teardrop attack
  • C. Fraggle attack
  • D. Snork attack

Answer: A

NEW QUESTION 5
Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc.
Which of the following types of Cross-Site Scripting attack Ryan intends to do?

  • A. Document Object Model (DOM)
  • B. Non persistent
  • C. SAX
  • D. Persistent

Answer: D

NEW QUESTION 6
Which of the following IP packet elements is responsible for authentication while using IPSec?

  • A. Authentication Header (AH)
  • B. Layer 2 Tunneling Protocol (L2TP)
  • C. Internet Key Exchange (IKE)
  • D. Encapsulating Security Payload (ESP)

Answer: A

NEW QUESTION 7
You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows Server 2008 member servers and 120 Windows Vista client computers. You are implementing a caching-only DNS server on one of the member servers. Your assistant wants to know about the caching-only DNS server. Which of the following statements about the caching-only DNS server are correct?
Each correct answer represents a complete solution. Choose three.

  • A. It hosts zones and authoritative for a particular domai
  • B. It reduces the amount of DNS traffic on a Wide Area Network (WAN)
  • C. It is useful at a site where DNS functionality is needed locally but there is not a requirement for a separate domain for that locatio
  • D. It performs queries, caches the answers, and returns the result

Answer: BCD

NEW QUESTION 8
Which of the following parts of hard disk in Mac OS X File system stores information related to the files?

  • A. Resource fork
  • B. Data fork
  • C. System fork
  • D. Log fork

Answer: A

NEW QUESTION 9
Which of the following ports is used by e-mail clients to send request to connect to the server?

  • A. Port 21
  • B. Port 20
  • C. Port 23
  • D. Port 25

Answer: D

NEW QUESTION 10
Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Buffer-overflow attack
  • B. Brute force attack
  • C. Dictionary-based attack
  • D. Password guessing
  • E. Social engineering
  • F. Zero-day attack
  • G. Denial-of-service (DoS) attack
  • H. Rainbow attack

Answer: BCDEH

NEW QUESTION 11
Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?
Each correct answer represents a complete solution. Choose two.

  • A. SYN flood attack
  • B. Teardrop attack
  • C. Land attack
  • D. Ping of Death attack

Answer: BD

NEW QUESTION 12
What is the maximum size of an IP datagram for Ethernet?

  • A. 4500 bytes
  • B. 1024 bytes
  • C. 1200 bytes
  • D. 1500 bytes

Answer: D

NEW QUESTION 13
Which of the following tools is used to store the contents of a TDB (Trivial Database) file to the standard output when debugging problems with TDB files?

  • A. tcpdump
  • B. pdbedit
  • C. Winbindd
  • D. tdbdump

Answer: D

NEW QUESTION 14
Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

  • A. CHKDSK /I
  • B. CHKDSK /R /F
  • C. CHKDSK /C /L
  • D. CHKDSK /V /X

Answer: B

NEW QUESTION 15
Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?

  • A. Display memory error
  • B. Cache memory test failed
  • C. Processor failure
  • D. Mother board timer not operational

Answer: C

NEW QUESTION 16
Which of the following tools is used to detect spam email without checking the content?

  • A. Kismet
  • B. EtherApe
  • C. DCC
  • D. Sniffer

Answer: C

NEW QUESTION 17
Which of the following is an expression of interference that triggers a false positive signal during an intrusion detection process performed by IDS?

  • A. Confidence value
  • B. Handshake
  • C. Site policy
  • D. Noise

Answer: D

NEW QUESTION 18
Which of the following wireless security features provides the best wireless security mechanism?

  • A. WPA
  • B. WPA with Pre Shared Key
  • C. WPA with 802.1X authentication
  • D. WEP

Answer: C

NEW QUESTION 19
Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.

  • A. TRACERT
  • B. Ping
  • C. IPCONFIG
  • D. Netstat

Answer: AB

NEW QUESTION 20
......

P.S. Certshared now are offering 100% pass ensure GCIA dumps! All GCIA exam questions have been updated with correct answers: https://www.certshared.com/exam/GCIA/ (508 New Questions)