GCIA | Latest GCIA Exam Dumps For GIAC Certified Intrusion Analyst Certification

Cause all that matters here is passing the GIAC GCIA exam. Cause all that you need is a high score of GCIA GIAC Certified Intrusion Analyst exam. The only one thing you need to do is downloading Pass4sure GCIA exam study guides now. We will not let you down with our money-back guarantee.

Also have GCIA free dumps questions for you:

NEW QUESTION 1
What is the order of the extension headers that is followed by IPv6?

  • A. Destination Options (first), Routing, IPv6 header, Hop-by-Hop, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payloa
  • B. Routing, Hop-by-Hop, Destination Options (first), Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payloa
  • C. Fragment, Routing, Hop-by-Hop, Destination Options (first), Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payloa
  • D. IPv6 header, Hop-by-Hop, Destination Options (first), Routing, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payloa

Answer: D

NEW QUESTION 2
Which of the following is a hardware/software platform that is designed to analyze, detect, and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

  • A. NIPS
  • B. HIPS
  • C. NIDS
  • D. HIDS

Answer: A

NEW QUESTION 3
Which of the following software is used for Steganography?

  • A. CryptoForge
  • B. Fort Knox
  • C. Dsniff
  • D. Ethreal

Answer: B

NEW QUESTION 4
Which of the following is the correct order of loading system files into the main memory of the system, when the computer is running on Microsoft's Windows XP operating system?

  • A. NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe
  • B. BOOT.ini, HAL.dll, NTDETECT.com, NTLDR, NTOSKRNL.exe
  • C. NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe
  • D. NTLDR, BOOT.ini, NTDETECT.com, HAL.dll, NTOSKRNL.exe

Answer: D

NEW QUESTION 5
You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?

  • A. NETSTAT -n
  • B. NETSTAT -s
  • C. NBTSTAT -n
  • D. NBTSTAT -s

Answer: C

NEW QUESTION 6
John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He scans the We-are-secure server and gets the following result:
sysDescr.0 = STRING. "SunOS we-are-secure.com 4.1.3_U1 1 sun4m"
sysObjectID.0 = OID. enterprises.hp.nm.hpsystem.10.1.1
sysUpTime.0 = Timeticks: (156474552) 18 days, 12:00:09
sysContact.0 = STRING. ""
sysName.0 = STRING. "we-are-secure.com"
sysLocation.0 = STRING. ""
sysServices.0 = INTEGER: 6
Which of the following tools is John using to perform the scan?

  • A. snmpwalk
  • B. Kismet
  • C. AirMagnet
  • D. AiroPeek

Answer: A

NEW QUESTION 7
John enters a URL http://www.cisco.com/web/learning in the web browser. A web page appears after he enters the URL. Which of the following protocols is used to resolve www.cisco.com into the correct IP address?

  • A. DNS
  • B. SMTP
  • C. DHCP
  • D. ARP

Answer: A

NEW QUESTION 8
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone. Which of the following commands will you use to accomplish the task?

  • A. Dnscmd <server name> /config /enableglobalnames 1
  • B. Dnscmd <server name> /config /enableglobalnamessupport 0
  • C. Dnscmd <server name> /config /enableglobalnamessupport 1
  • D. Dnscmd <server name> /config /globalnamesqueryorder 0

Answer: C

NEW QUESTION 9
Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police.
A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

  • A. Linux
  • B. Mac OS
  • C. MINIX 3
  • D. Windows XP

Answer: B

NEW QUESTION 10
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

  • A. 80
  • B. 21
  • C. 443
  • D. 22

Answer: D

NEW QUESTION 11
Which of the following ports is used by e-mail clients to send request to connect to the server?

  • A. Port 21
  • B. Port 20
  • C. Port 23
  • D. Port 25

Answer: D

NEW QUESTION 12
Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

  • A. Command injection attack
  • B. Code injection attack
  • C. Cross-Site Request Forgery
  • D. Cross-Site Scripting attack

Answer: B

NEW QUESTION 13
Which of the following is used over the Internet for better security?

  • A. SOCKS
  • B. S-HTTP
  • C. Wingate
  • D. IMAP Server

Answer: A

NEW QUESTION 14
Trinity wants to send an email to her friend. She uses the MD5 generator to calculate cryptographic hash of her email to ensure the security and integrity of the email. MD5 generator, which Trinity is using operates in two steps:
Creates check file
Verifies the check file
Which of the following MD5 generators is Trinity using?

  • A. Secure Hash Signature Generator
  • B. Mat-MD5
  • C. Chaos MD5
  • D. MD5 Checksum Verifier

Answer: D

NEW QUESTION 15
John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?

  • A. Sequence++ attack
  • B. Phreaking
  • C. Man-in-the-middle attack
  • D. War dialing

Answer: B

NEW QUESTION 16
Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

  • A. Unicast
  • B. Anycast
  • C. Loopback
  • D. Multicast

Answer: B

NEW QUESTION 17
......

P.S. Easily pass GCIA Exam with 508 Q&As Allfreedumps.com Dumps & pdf Version, Welcome to Download the Newest Allfreedumps.com GCIA Dumps: https://www.allfreedumps.com/GCIA-dumps.html (508 New Questions)