Up To The Immediate Present GCIA Training Tools For GIAC Certified Intrusion Analyst Certification

Want to know Exambible GCIA Exam practice test features? Want to lear more about GIAC GIAC Certified Intrusion Analyst certification experience? Study Precise GIAC GCIA answers to Refresh GCIA questions at Exambible. Gat a success with an absolute guarantee to pass GIAC GCIA (GIAC Certified Intrusion Analyst) test on your first attempt.

GIAC GCIA Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
________ is a command-line tool that can check the DNS registration of a domain controller.

  • A. NBTSTAT
  • B. NETSH
  • C. DNSCMD
  • D. DCDIAG

Answer: D

NEW QUESTION 2
Which of the following types of firewall ensures that the packets are part of the established session?

  • A. Switch-level firewall
  • B. Application-level firewall
  • C. Stateful inspection firewall
  • D. Circuit-level firewall

Answer: C

NEW QUESTION 3
Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?
Each correct answer represents a complete solution. Choose all that apply.

  • A. portsentry
  • B. libnids
  • C. nmap
  • D. scanlogd

Answer: ABD

NEW QUESTION 4
Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?
Each correct answer represents a part of the solution. Choose all that apply.

  • A. Text Semagrams
  • B. Linguistic steganography
  • C. Technical steganography
  • D. Perceptual masking

Answer: AB

NEW QUESTION 5
Which of the following Linux/UNIX commands is used to delete files permanently so that the files cannot be recovered?

  • A. del
  • B. shred
  • C. erase
  • D. rm

Answer: B

NEW QUESTION 6
Which of the following ports is the default port for IMAP4 protocol?

  • A. TCP port 143
  • B. TCP port 25
  • C. TCP port 443
  • D. TCP port 80

Answer: A

NEW QUESTION 7
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server
2008 network environment. The servers on the network run Windows Server 2008 R2. All client computers on the network run Windows 7 Ultimate. You have configured DirectAccess feature on the laptop of few sales managers so that they can access corporate network from remote locations. Their laptops run Windows 7 Ultimate. Which of the following options does the DirectAccess use to keep data safer while traveling through travels public networks?

  • A. IPv6-over-IPsec
  • B. IPSec-over-IPv4
  • C. VPN
  • D. SSL

Answer: A

NEW QUESTION 8
Which of the following types of Intrusion detection systems (IDS) is used for port mirroring?

  • A. Port address-based IDS
  • B. Network-based IDS (NIDS)
  • C. Host-based IDS (HIDS)
  • D. Anomaly-based IDS

Answer: B

NEW QUESTION 9
Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?

  • A. disable dnsserver
  • B. alter dnsserver
  • C. delete dnsserver
  • D. remove dnsserver

Answer: C

NEW QUESTION 10
Which of the following ports is used by Layer 2 Tunneling Protocol (L2TP)?

  • A. UDP port 1701
  • B. UDP port 67
  • C. TCP port 23
  • D. TCP port 25

Answer: A

NEW QUESTION 11
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer.
You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?

  • A. start /w ocsetup DNS-Server-Core-Role
  • B. start /w ocsetup DnsServer
  • C. start /w ocsetup DnsServercorerole
  • D. net start "dns server"

Answer: A

NEW QUESTION 12
Which of the following is an exact duplicate of computer's hard drive?

  • A. system image
  • B. bit-stream image
  • C. data image
  • D. drive image

Answer: B

NEW QUESTION 13
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.

  • A. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized acces
  • B. These are the threats that originate from within the organizatio
  • C. These are the threats intended to flood a network with large volumes of access request
  • D. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Interne

Answer: ACD

NEW QUESTION 14
Which of the following activities will you use to retrieve user names, and info on groups, shares, and services of networked computers?

  • A. Network tap
  • B. Packet crafting
  • C. Network mapping
  • D. Network enumerating

Answer: D

NEW QUESTION 15
Host-based IDS (HIDS) is an Intrusion Detection System that runs on the system to be monitored. HIDS monitors only the data that it is directed to, or originates from the system on which HIDS is installed. Besides monitoring network traffic for detecting attacks, it can also monitor other parameters of the system such as running processes, file system access and integrity, and user logins for identifying malicious activities. Which of the following tools are examples of HIDS?
Each correct answer represents a complete solution. Choose all that apply.

  • A. HPing
  • B. BlackIce Defender
  • C. Tripwire
  • D. Legion

Answer: BC

NEW QUESTION 16
Which of the following commands is used to verify the hash value in Netcat?

  • A. type
  • B. check
  • C. mount
  • D. checksum

Answer: A

NEW QUESTION 17
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.
You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open?
Each correct answer represents a complete solution. Choose two.

  • A. 20
  • B. 25
  • C. 80
  • D. 110

Answer: BD

NEW QUESTION 18
Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

  • A. Unicast
  • B. Anycast
  • C. Loopback
  • D. Multicast

Answer: B

NEW QUESTION 19
Which of the following organizations is dedicated to computer security research and information sharing?

  • A. FBI
  • B. NIPC
  • C. Honeynet Project
  • D. IEEE

Answer: C

NEW QUESTION 20
Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.
The tool uses raw IP packets to determine the following:
What ports are open on our network systems.
What hosts are available on the network.
Identify unauthorized wireless access points.
What services (application name and version) those hosts are offering.
What operating systems (and OS versions) they are running.
What type of packet filters/firewalls are in use.
Which of the following tools is Victor using?

  • A. Nessus
  • B. Nmap
  • C. Sniffer
  • D. Kismet

Answer: B

NEW QUESTION 21
......

Thanks for reading the newest GCIA exam dumps! We recommend you to try the PREMIUM DumpSolutions.com GCIA dumps in VCE and PDF here: https://www.dumpsolutions.com/GCIA-dumps/ (508 Q&As Dumps)