GCIA | All About Validated GCIA Free Draindumps

Validated of GCIA answers materials and latest exam for GIAC certification for IT examinee, Real Success Guaranteed with Updated GCIA pdf dumps vce Materials. 100% PASS GIAC Certified Intrusion Analyst exam Today!

Free GCIA Demo Online For GIAC Certifitcation:

NEW QUESTION 1
Which of the following is the difference between SSL and S-HTTP?

  • A. SSL operates at the network layer and S-HTTP operates at the application laye
  • B. SSL operates at the transport layer and S-HTTP operates at the application laye
  • C. SSL operates at the application layer and S-HTTP operates at the transport laye
  • D. SSL operates at the application layer and S-HTTP operates at the network laye

Answer: B

NEW QUESTION 2
Which of the following is a valid IP address for class B Networks?

  • A. 225.128.98.7
  • B. 80.33.5.7
  • C. 212.136.45.8
  • D. 172.157.88.3

Answer: D

NEW QUESTION 3
In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?

  • A. Insertion
  • B. Session splicing
  • C. Fragmentation overlap
  • D. Fragmentation overwrite

Answer: B

NEW QUESTION 4
Which of the following is used for remote file access by UNIX/Linux systems?

  • A. Server Message Block (SMB)
  • B. Network File System (NFS)
  • C. Common Internet File System (CIFS)
  • D. NetWare Core Protocol (NCP)

Answer: B

NEW QUESTION 5
You are responsible for security at a company that specializes in e-commerce. You realize that given the high volume of Web traffic, there is a significant chance of someone being able to breach your perimeter. You want to make sure that should this occur, you can redirect the attacker away from sensitive data. How would you best accomplish this?

  • A. Implement a passive IDS
  • B. Implement a honey po
  • C. Implement a stateful packet inspection firewal
  • D. Implement a network based ID

Answer: B

NEW QUESTION 6
The National Shoes Inc. has an SNMP enabled router installed on its network. IT Manager wants to monitor all SNMP traffic generated by the router. So, he installs a Network Monitor on a Windows2000 Server computer on the network. The router is configured to send traps to an SNMP manager installed on another server. He wants to get a notification whenever the network router raises an SNMP trap. What will he do to achieve this?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a part of the solution. Choose two.

  • A. Install an SNMP manager on the route
  • B. Start the Windows 2000 Alert Service on the serve
  • C. Create a TCP/IP filter on the serve
  • D. Create a Network Monitor filter that has a pattern match for SNMP traffi
  • E. Create a Network Monitor trigger to run the NET SEND comman
  • F. Configure the network router to trap the IP address of the serve

Answer: DE

NEW QUESTION 7
You are using the TRACERT utility to trace the route to CertLeader.com. You receive the following output:
Which of the following conclusions can you draw from viewing the output?
Each correct answer represents a complete solution. Choose two.

  • A. Everything is fin
  • B. One of the routers on the path to the destination is not functiona
  • C. The destination computer is not operationa
  • D. The IP address of the destination computer is not resolve

Answer: BC

NEW QUESTION 8
What is the process of detecting unauthorized access known as?

  • A. Intrusion detection
  • B. Misuse detection
  • C. Anomaly detection
  • D. Integrity detection

Answer: A

NEW QUESTION 9
Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with a project to investigate a computer in the network of SecureEnet Inc. The compromised system runs on Windows operating system. Adam decides to use Helix Live for Windows to gather data and electronic evidences starting with retrieving volatile data and transferring it to server component via TCP/IP. Which of the following application software in Helix Windows Live will he use to retrieve volatile data and transfer it to the server component via TCP/IP?

  • A. FAU
  • B. FTK imager
  • C. Drive Manager
  • D. FSP

Answer: D

NEW QUESTION 10
Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?

  • A. tcpdump -A file_name
  • B. tcpdump -D file_name
  • C. tcpdump -X file_name
  • D. tcpdump -F file_name

Answer: D

NEW QUESTION 11
Rick works as the Network Administrator of Baby Blue Inc. He wants to upgrade the existing network to the Active Directory based Windows 2000 network.
He configures a DNS on the network. Which of the following is the primary reason that the DNS is required in an Active Directory environment?

  • A. Without installing the DNS, you cannot install the Active Directory in the networ
  • B. Netlogon uses the DNS to find a domain controller in the networ
  • C. The Active Directory uses the DNS zone transfer protocol during replicatio
  • D. The Active Directory is stored within the DNS databas

Answer: B

NEW QUESTION 12
Which of the following ports can be used for IP spoofing?

  • A. NNTP 119
  • B. POP 110
  • C. Rlogin 513
  • D. Whois 43

Answer: C

NEW QUESTION 13
You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

  • A. Site-local
  • B. Global unicast
  • C. Local-link
  • D. Loopback

Answer: B

NEW QUESTION 14
Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

  • A. Netresident
  • B. Snort
  • C. Wireshark
  • D. NetWitness

Answer: C

NEW QUESTION 15
You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000-based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?

  • A. PING
  • B. TELNET
  • C. NETSTAT
  • D. TRACERT

Answer: A

NEW QUESTION 16
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

  • A. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer
  • B. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer
  • C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
  • D. Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

Answer: A

NEW QUESTION 17
......

Thanks for reading the newest GCIA exam dumps! We recommend you to try the PREMIUM DumpSolutions.com GCIA dumps in VCE and PDF here: https://www.dumpsolutions.com/GCIA-dumps/ (508 Q&As Dumps)