★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW GCIA Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/GCIA-dumps.html


Our pass rate is high to 98.9% and the similarity percentage between our GCIA study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the GIAC GCIA exam in just one try? I am currently studying for the GIAC GCIA exam. Latest GIAC GCIA Test exam practice questions and answers, Try GIAC GCIA Brain Dumps First.

Free demo questions for GIAC GCIA Exam Dumps Below:

NEW QUESTION 1
Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?

  • A. MAK ID
  • B. IP address
  • C. IP identification number
  • D. SSID

Answer: C

NEW QUESTION 2
Which method would provide the highest level of protection for all data transmitted on the internal network only? (Click the Exhibit button on the toolbar to see the case study.)

  • A. IPSec tunnel mode
  • B. SSL
  • C. PPTP
  • D. SMB
  • E. IPSec transport mode

Answer: E

NEW QUESTION 3
What is the maximum size of an IP datagram for Ethernet?

  • A. 4500 bytes
  • B. 1024 bytes
  • C. 1200 bytes
  • D. 1500 bytes

Answer: D

NEW QUESTION 4
Which of the following ports is used by Layer 2 Tunneling Protocol (L2TP)?

  • A. UDP port 1701
  • B. UDP port 67
  • C. TCP port 23
  • D. TCP port 25

Answer: A

NEW QUESTION 5
Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

  • A. Preparation
  • B. gaining access
  • C. Scanning
  • D. Reconnaissance

Answer: A

NEW QUESTION 6
________ is a command-line tool that can check the DNS registration of a domain controller.

  • A. NBTSTAT
  • B. NETSH
  • C. DNSCMD
  • D. DCDIAG

Answer: D

NEW QUESTION 7
Which of the following wireless security features provides the best wireless security mechanism?

  • A. WPA with Pre Shared Key
  • B. WPA with 802.1X authentication
  • C. WEP
  • D. WPA

Answer: B

NEW QUESTION 8
Host-based IDS (HIDS) is an Intrusion Detection System that runs on the system to be monitored. HIDS monitors only the data that it is directed to, or originates from the system on which HIDS is installed. Besides monitoring network traffic for detecting attacks, it can also monitor other parameters of the system such as running processes, file system access and integrity, and user logins for identifying malicious activities. Which of the following tools are examples of HIDS?
Each correct answer represents a complete solution. Choose all that apply.

  • A. HPing
  • B. BlackIce Defender
  • C. Tripwire
  • D. Legion

Answer: BC

NEW QUESTION 9
John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses. Which of the following worms has attacked the computer?

  • A. Ramen
  • B. LoveLetter
  • C. Code red
  • D. Nimda

Answer: A

NEW QUESTION 10
Which of the following is the default port for POP3?

  • A. 21
  • B. 110
  • C. 80
  • D. 25

Answer: B

NEW QUESTION 11
This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:
-It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc. -It is commonly used for the following purposes:

  • A. War driving
  • B. Detecting unauthorized access points
  • C. Detecting causes of interference on a WLAN
  • D. WEP ICV error tracking
  • E. Making Graphs and Alarms on 802.11 Data, including Signal Strength

Answer: D

NEW QUESTION 12
Which of the following ICMP types refers to the message "Time Exceeded"?

  • A. Type 4
  • B. Type 12
  • C. Type 11
  • D. Type 5

Answer: C

NEW QUESTION 13
Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

  • A. Active IDS
  • B. Signature-based IDS
  • C. Passive IDS
  • D. Network-based IDS

Answer: A

NEW QUESTION 14
Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?
Each correct answer represents a complete solution. Choose all that apply.

  • A. All ideas present in the investigative report should flow logically from facts to conclusion
  • B. Opinion of a lay witness should be included in the investigative repor
  • C. The investigative report should be understandable by any reade
  • D. There should not be any assumptions made about any facts while writing the investigative repor

Answer: ACD

NEW QUESTION 15
Which of the following command-line utilities is used to show the state of current TCP/IP connections?

  • A. PING
  • B. TRACERT
  • C. NETSTAT
  • D. NSLOOKUP

Answer: C

NEW QUESTION 16
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

  • A. Public key
  • B. Digital certificates
  • C. Twofish
  • D. RSA

Answer: AB

NEW QUESTION 17
Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?

  • A. alter dnsserver
  • B. delete dnsserver
  • C. disable dnsserver
  • D. remove dnsserver

Answer: B

NEW QUESTION 18
Which of the following is the process of categorizing attack alerts produced from IDS?

  • A. Site policy implementation
  • B. Blocking
  • C. Intrusion classify
  • D. Alarm filtering

Answer: D

NEW QUESTION 19
Which of the following utilities is used to verify the existence of a host in a network?

  • A. IPCONFIG
  • B. NETSTAT
  • C. CHKDSK
  • D. PING

Answer: D

NEW QUESTION 20
You work as a Network Administrator for NetTech Inc. You want to know the local IP address, subnet mask, and default gateway of a NIC in a Windows 98 computer. Which of the following utilities will you use to accomplish this ?

  • A. TRACERT
  • B. WINIPCFG
  • C. NETSTAT
  • D. FDISK

Answer: B

NEW QUESTION 21
......

P.S. Easily pass GCIA Exam with 508 Q&As Certshared Dumps & pdf Version, Welcome to Download the Newest Certshared GCIA Dumps: https://www.certshared.com/exam/GCIA/ (508 New Questions)