2023 New GCIA Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/GCIA/

Act now and download your GIAC GCIA test today! Do not waste time for the worthless GIAC GCIA tutorials. Download Renovate GIAC GIAC Certified Intrusion Analyst exam with real questions and answers and begin to learn GIAC GCIA with a classic professional.

Free demo questions for GIAC GCIA Exam Dumps Below:

NEW QUESTION 1
Which of the following well-known ports is used by BOOTP?

  • A. TCP 161
  • B. UDP 69
  • C. TCP 21
  • D. UDP 67

Answer: D

NEW QUESTION 2
Which of the following attacks involves multiple compromised systems to attack a single target?

  • A. Brute force attack
  • B. DDoS attack
  • C. Replay attack
  • D. Dictionary attack

Answer: B

NEW QUESTION 3
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a compromised system of a cyber criminal, who hides some information in his computer. This computer runs on Linux operating system. Adam wants to extract the data units of a file, which is specified by its meta-data address. He is using the Sleuth Kit for this purpose. Which of the following commands in the Sleuth kit will he use to accomplish the task?

  • A. dcat
  • B. istat
  • C. ifind
  • D. icat

Answer: D

NEW QUESTION 4
Which of the following attacks is also known as the bucket-brigade attack?

  • A. Rainbow attack
  • B. ARP spoofing attack
  • C. Man-in-the-middle attack
  • D. DoS attack

Answer: C

NEW QUESTION 5
You work as a network administrator for BlueWell Inc. You have to convert your 48-bit host address (MAC address) to an IPv6 54-bit address. Using the IEEE-EUI-64 conversion process, how do you convert the 48-bit host address (MAC address) to an IPv6 54-bit address?

  • A. Add E
  • B. FE between the third and fourth byte
  • C. Add F
  • D. EE between the third and fourth byte
  • E. Add F
  • F. EE between the third and fourth byte
  • G. Add F
  • H. FE between the third and fourth bytes

Answer: D

NEW QUESTION 6
Which of the following monitors program activities and modifies malicious activities on a system?

  • A. Back door
  • B. RADIUS
  • C. HIDS
  • D. NIDS

Answer: C

NEW QUESTION 7
This tool is known as __________.

  • A. Kismet
  • B. Absinthe
  • C. NetStumbler
  • D. THC-Scan

Answer: C

NEW QUESTION 8
Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. Choose all that apply.

  • A. For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresse
  • B. It increases the number of available IP addresse
  • C. It provides improved authentication and securit
  • D. It uses 128-bit addresse
  • E. It uses longer subnet masks than those used in IPv4.

Answer: ABCD

NEW QUESTION 9
You are responsible for security at a company that specializes in e-commerce. You realize that given the high volume of Web traffic, there is a significant chance of someone being able to breach your perimeter. You want to make sure that should this occur, you can redirect the attacker away from sensitive data. How would you best accomplish this?

  • A. Implement a passive IDS
  • B. Implement a honey po
  • C. Implement a stateful packet inspection firewal
  • D. Implement a network based ID

Answer: B

NEW QUESTION 10
Which of the following ports is used by e-mail clients to send request to connect to the server?

  • A. Port 23
  • B. Port 21
  • C. Port 25
  • D. Port 20

Answer: C

NEW QUESTION 11
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network. The network is connected to the Internet through a firewall. A user complains that he is unable to access the abc.com site. However, he can access all other sites. Which of the following tools will help you diagnose the problem?

  • A. IPCONFIG
  • B. ROUTE
  • C. TELNET
  • D. TRACERT

Answer: D

NEW QUESTION 12
Which of the following types of Intrusion detection systems (IDS) is used for port mirroring?

  • A. Port address-based IDS
  • B. Network-based IDS (NIDS)
  • C. Host-based IDS (HIDS)
  • D. Anomaly-based IDS

Answer: B

NEW QUESTION 13
Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Close existing email account and open new email accoun
  • B. Forward a copy of the spam to the ISP to make the ISP conscious of the spa
  • C. Report the incident to the FTC (The U.
  • D. Federal Trade Commission) by sending a copy of the spam messag
  • E. Send an email to the domain administrator responsible for the initiating IP addres

Answer: BC

NEW QUESTION 14
Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot. Andrew wants to check the booting process. He suspects that an error persists in the bootloader of Mac OS X. Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?

  • A. LILO
  • B. BootX
  • C. NT Loader
  • D. GRUB

Answer: B

NEW QUESTION 15
Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police.
A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

  • A. Linux
  • B. Mac OS
  • C. MINIX 3
  • D. Windows XP

Answer: B

NEW QUESTION 16
Which of the following statements about the traceroute utility are true?
Each correct answer represents a complete solution. Choose all that apply.

  • A. It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection System
  • B. It records the time taken for a round trip for each packet at each route
  • C. It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote hos
  • D. It is an online tool that performs polymorphic shell code attack

Answer: BC

NEW QUESTION 17
Which of the following wireless security features provides the best wireless security mechanism?

  • A. WPA with Pre Shared Key
  • B. WPA with 802.1X authentication
  • C. WEP
  • D. WPA

Answer: B

NEW QUESTION 18
Which of the following password cracking attacks is implemented by calculating all the possible hashes for a set of characters?

  • A. Brute force attack
  • B. Dictionary attack
  • C. Rainbow attack
  • D. SQL injection attack

Answer: C

NEW QUESTION 19
Which of the following tables is formed by NTFS file system to keep the track of files, to store metadata, and their location?

  • A. The Master File Table
  • B. The System File Table
  • C. The Master Allocation Table
  • D. The File Allocation Table

Answer: A

NEW QUESTION 20
......

P.S. Surepassexam now are offering 100% pass ensure GCIA dumps! All GCIA exam questions have been updated with correct answers: https://www.surepassexam.com/GCIA-exam-dumps.html (508 New Questions)