Examcollection GCIA Questions are updated and all GCIA answers are verified by experts. Once you have completely prepared with our GCIA exam prep kits you will be ready for the real GCIA exam without a problem. We have Improved GIAC GCIA dumps study guide. PASSED GCIA First attempt! Here What I Did.
Online GCIA free questions and answers of New Version:
NEW QUESTION 1
Smith works as a Network Administrator for HCP Inc. He sets up a DNS server on the network and enables DNS service on all computers. However, DNS is not working properly. Which of the following commands should Smith use to verify the DNS configuration?
- A. ping
- B. nslookup
- C. tracert
- D. pathping
Answer: B
NEW QUESTION 2
In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?
- A. Fragmentation overlap attack
- B. Evasion attack
- C. Fragmentation overwrite attack
- D. Insertion attack
Answer: D
NEW QUESTION 3
What netsh command should be run to enable IPv6 routing?
Each correct answer represents a part of the solution. Choose two.
- A. netsh interface IPv6 show interface
- B. netsh interface IPv6 add routes
- C. netsh interface IPv6 set interface
- D. netsh interface IPv6 add address
Answer: BC
NEW QUESTION 4
Which of the following snort keywords is used to match a defined payload value?
- A. content
- B. ttl
- C. id
- D. msg
Answer: A
NEW QUESTION 5
You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee of the production department is facing the problem in the IP configuration of the network connection.
He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer. While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command. You enter the following command in the elevated command prompt on the computer:
netsh advfirewall firewall add rule name="ICMPv4" protocol=icmpv4:any,any dir=in action=allow
Which of the following actions will this command perform?
- A. Permit ICMPv4 packet to pass through the firewal
- B. Permit ICMPv4 Echo Reques
- C. Enable packet filtering by Windows Firewal
- D. Disable Firewall temporaril
Answer: A
NEW QUESTION 6
You work as a System Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. Your network is configured for IPv6 IP addressing. Which of the following commands will you use to test TCP/IP connectivity?
- A. ping6
- B. ifconfig
- C. traceroute
- D. ping
Answer: A
NEW QUESTION 7
Which of the following tools can be used for passive OS fingerprinting?
- A. dig
- B. nmap
- C. ping
- D. tcpdump
Answer: D
NEW QUESTION 8
Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?
- A. Linux Live CD
- B. DOS boot disk
- C. Secure Authentication for EnCase (SAFE)
- D. EnCase with a hardware write blocker
Answer: C
NEW QUESTION 9
Which of the following is a reason to implement security logging on a DNS server?
- A. For recording the number of queries resolved
- B. For preventing malware attacks on a DNS server
- C. For measuring a DNS server's performance
- D. For monitoring unauthorized zone transfer
Answer: D
NEW QUESTION 10
Which of the following hacking tools provides shell access over ICMP?
- A. John the Ripper
- B. Loki
- C. Nessus
- D. Nmap
Answer: B
NEW QUESTION 11
Which of the following methods is a behavior-based IDS detection method?
- A. Knowledge-based detection
- B. Protocol detection
- C. Statistical anomaly detection
- D. Pattern matching detection
Answer: C
NEW QUESTION 12
Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?
- A. libpcap
- B. WinPCap
- C. PCAP
- D. SysPCap
Answer: B
NEW QUESTION 13
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. Your manager requires you migrate the network to IPv6-enabled network without affecting any client computers. Which of the following actions will you take to accomplish the task?
- A. Configure stub zone on the DNS servers in the networ
- B. Configure GlobalNames zones on the DNS servers in the networ
- C. Install a new Windows Server 2003 DNS server computer on each domain and configure GlobalNames zone
- D. Configure the client computers to use WIN
Answer: B
NEW QUESTION 14
Which of the following wireless security features provides the best wireless security mechanism?
- A. WPA with Pre Shared Key
- B. WPA with 802.1X authentication
- C. WEP
- D. WPA
Answer: B
NEW QUESTION 15
You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?
- A. ping -a
- B. ping -4
- C. ping -t
- D. ping –l
Answer: D
NEW QUESTION 16
You work as a Network Administrator for Tech2tech Inc. You have configured a network-based IDS for your company.
You have physically installed sensors at all key positions throughout the network such that they all report to the command console.
What will be the key functions of the sensors in such a physical layout?
Each correct answer represents a complete solution. Choose all that apply.
- A. To collect data from operating system logs
- B. To notify the console with an alert if any intrusion is detected
- C. To analyze for known signatures
- D. To collect data from Web servers
Answer: BC
NEW QUESTION 17
Which of the following commands displays the IPX routing table entries?
- A. sh ipx traffic
- B. sh ipx int e0
- C. sh ipx route
- D. sho ipx servers
Answer: C
NEW QUESTION 18
Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?
- A. Dialler attack
- B. Denial of service
- C. Eavesdropping
- D. Intrusion
Answer: C
NEW QUESTION 19
Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?
- A. Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces
- B. Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces
- C. Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system
- D. Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps
Answer: B
NEW QUESTION 20
Sasha wants to add an entry to your DNS database for your mail server. Which of the following types of resource records will she use to accomplish this?
- A. ANAME
- B. SOA
- C. MX
- D. CNAME
Answer: C
NEW QUESTION 21
......
100% Valid and Newest Version GCIA Questions & Answers shared by DumpSolutions.com, Get Full Dumps HERE: https://www.dumpsolutions.com/GCIA-dumps/ (New 508 Q&As)