Certbus > GIAC > GIAC Certifications > GCIA > GCIA Online Practice Questions and Answers

GCIA Online Practice Questions and Answers

Questions 4

Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?

A. D

B. N

C. Z

D. C

Browse 507 Q&As
Questions 5

Which of the following wireless security features provides the best wireless security mechanism?

A. WPA with Pre Shared Key

B. WPA with 802.1X authentication

C. WEP

D. WPA

Browse 507 Q&As
Questions 6

Which of the following organizations is dedicated to computer security research and information sharing?

A. FBI

B. NIPC

C. Honeynet Project

D. IEEE

Browse 507 Q&As
Questions 7

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses

the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

A. Dsniff

B. Libnids

C. Cain

D. LIDS

Browse 507 Q&As
Questions 8

For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be

whether the user can access Web sites after powering the computer and logging on.

Each correct answer represents a complete solution. Choose all that apply.

A. DNS

B. HTTP/HTTPS

C. DHCP

D. NTP

Browse 507 Q&As
Questions 9

Which of the following statements about User Datagram Protocol (UDP) is true?

A. It is a hardware protocol.

B. It is a connectionless protocol.

C. It is a tunneling protocol.

D. It is a connection-oriented protocol.

Browse 507 Q&As
Questions 10

Which of the following programs is used to add words to spam e-mails so that the e-mail is not considered spam and therefore is delivered as if it were a normal message?

A. Adler-32

B. Hash filtrer

C. Hash buster

D. Checksum

Browse 507 Q&As
Questions 11

You are using the TRACERT utility to trace the route to passguide.com. You receive the following output:

Which of the following conclusions can you draw from viewing the output? Each correct answer represents a complete solution. Choose two.

A. Everything is fine.

B. One of the routers on the path to the destination is not functional.

C. The destination computer is not operational.

D. The IP address of the destination computer is not resolved.

Browse 507 Q&As
Questions 12

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker? Each correct answer represents a complete solution. Choose all that apply.

A. portsentry

B. libnids

C. nmap

D. scanlogd

Browse 507 Q&As
Questions 13

Which of the following determines which protocols can be used by clients to access the Internet in an ISA Server enabled network?

A. SMTP filter

B. POP intrusion detection filter

C. Site and content rule

D. Protocol rule

Browse 507 Q&As
Questions 14

Which of the following tools is used to recover data and partitions, and can run on Windows, Linux, SunOS, and Macintosh OS X operating systems?

A. GetDataBack

B. Acronis Recovery Expert

C. Active@ Disk Image

D. TestDisk

Browse 507 Q&As
Questions 15

Which of the following is an example of a social engineering attack?

A. Phishing

B. Man-in-the-middle attack

C. Browser Sniffing

D. E-mail bombing

Browse 507 Q&As
Questions 16

What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

A. Stoner

B. Code Red

C. Brain

D. Sircam

Browse 507 Q&As
Questions 17

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

A. The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enabled.

B. The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.

C. The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enabled.

D. The Enable Intrusion detection check box on the General tab page of the IP Packet FiltersProperties dialog box is not selected.

Browse 507 Q&As
Questions 18

Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?

A. D

B. N

C. Z

D. C

Browse 507 Q&As
Exam Code: GCIA
Exam Name: GIAC Certified Intrusion Analyst (GCIA)
Last Update: Mar 19, 2025
Questions: 507 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99