Want to know Exambible GCIA Exam practice test features? Want to lear more about GIAC GIAC Certified Intrusion Analyst certification experience? Study Pinpoint GIAC GCIA answers to Abreast of the times GCIA questions at Exambible. Gat a success with an absolute guarantee to pass GIAC GCIA (GIAC Certified Intrusion Analyst) test on your first attempt.
Online GIAC GCIA free dumps demo Below:
NEW QUESTION 1
What are the benefits of creating a new view using role-based CLI?
- A. Scalability
- B. Operational efficiency
- C. Security
- D. Availability
Answer: BCD
NEW QUESTION 2
Which of the following are open-source vulnerability scanners?
- A. Nessus
- B. NetRecon
- C. Hackbot
- D. Nikto
Answer: ACD
NEW QUESTION 3
Which of the following sectors on a hard disk contains codes that the computer uses to start the system?
- A. Sector 256
- B. Sector 0
- C. Sector 1
- D. Sector 128
Answer: B
NEW QUESTION 4
Which of the following configuration schemes in IPv6 allows a client to automatically configure its own IP address with or without IPv6 routers?
- A. Stateless autoconfiguration
- B. Stateful autoconfiguration
- C. Stateless configuration
- D. Stateful configuration
Answer: A
NEW QUESTION 5
Which of the following techniques is used to log network traffic?
- A. Cracking
- B. IP address spoofing
- C. Tunneling
- D. Sniffing
Answer: D
NEW QUESTION 6
Which of the following is the default port for TACACS?
- A. UDP port 49
- B. TCP port 80
- C. TCP port 25
- D. TCP port 443
Answer: A
NEW QUESTION 7
Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?
Each correct answer represents a complete solution. Choose all that apply.
- A. Names of the victims
- B. Date and time of incident
- C. Nature of harassment
- D. Location of each incident
Answer: ABD
NEW QUESTION 8
Which of the following malicious programs changes its signature continuously to be invisible to IDS?
- A. Boot sector virus
- B. Trojan
- C. Malware
- D. Polymorphic virus
Answer: D
NEW QUESTION 9
Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?
- A. Data control and Media Access control
- B. Logical control and Link control
- C. Logical Link control and Media Access control
- D. Machine Link control and Logical Link control
Answer: C
NEW QUESTION 10
Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?
Each correct answer represents a complete solution. Choose two.
- A. Attacker can use the Ping Flood DoS attack if WZC is use
- B. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain acces
- C. It will not allow the configuration of encryption and MAC filterin
- D. Sending information is not secure on wireless networ
- E. Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain acces
Answer: BD
NEW QUESTION 11
Which of the following tools is used to detect spam email without checking the content?
- A. Kismet
- B. EtherApe
- C. DCC
- D. Sniffer
Answer: C
NEW QUESTION 12
Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He is working on a case of a cyber crime. Peter knows that the good investigative report should not only communicate the relevant facts, but also present expert opinion. This report should not include the cases in which the expert acted as a lay witness. Which of the following type of witnesses is a lay witness?
- A. One who can give a firsthand account of something seen, heard, or experience
- B. One with special knowledge of the subject about which he or she is testifyin
- C. One who observes an even
- D. One who is not qualified as an expert witnes
Answer: D
NEW QUESTION 13
You are the Administrator for a Windows 2000 based network that uses DHCP to dynamically assign IP addresses to the clients and DNS servers. You want to ensure that the DNS servers can communicate with another DNS server. Which type of query will you run to achieve this?
- A. PATHPING
- B. NSLOOKUP
- C. PING
- D. Recursive
Answer: D
NEW QUESTION 14
You are planning DNS configuration for your company. You decide to configure an Active Directory integrated DNS.
Which of the following are the benefits of Active Directory integrated DNS configuration?
Each correct answer represents a complete solution. Choose all that apply.
- A. Replication is more efficien
- B. Multi-master environments are more fault toleran
- C. Single-master environment is simpler to administe
- D. It results in enhanced securit
Answer: ABD
NEW QUESTION 15
Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?
- A. Propagating Cipher Block Chaining (PCBC) Mode
- B. Cipher Block Chaining (CBC) Mode
- C. Electronic Codebook (ECB) Mode
- D. Cipher Feedback (CFB) Mode
Answer: B
NEW QUESTION 16
What is the maximum size of an IP datagram for Ethernet?
- A. 4500 bytes
- B. 1024 bytes
- C. 1200 bytes
- D. 1500 bytes
Answer: D
NEW QUESTION 17
CORRECT TEXT
Fill in the blank with the appropriate term.
___________ is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.
- A. Ingress filtering
Answer: A
NEW QUESTION 18
Which of the following is the default port used by Simple Mail Transfer Protocol (SMTP)?
- A. 80
- B. 25
- C. 20
- D. 21
Answer: B
NEW QUESTION 19
Which of the following command line tools are available in Helix Live acquisition tool on Windows?
Each correct answer represents a complete solution. Choose all that apply.
- A. netstat
- B. ipconfig
- C. .cab extractors
- D. whois
Answer: ABC
NEW QUESTION 20
Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?
- A. Network enumerating
- B. Packet collision
- C. Distributed Checksum Clearinghouse
- D. Packet crafting
Answer: D
NEW QUESTION 21
......
Recommend!! Get the Full GCIA dumps in VCE and PDF From Surepassexam, Welcome to Download: https://www.surepassexam.com/GCIA-exam-dumps.html (New 508 Q&As Version)