Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GIAC Security Administration GCIA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIA Premium Access

View all detail and faqs for the GCIA exam


367 Students Passed

85% Average Score

96% Same Questions
Viewing page 1 out of 11 pages
Viewing questions 1-15 out of questions
Questions # 1:

Which of the following protocols does IPsec use to perform various security functions in the network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Encapsulating Security Payload

B.

Internet Key Exchange

C.

Skinny Client Control Protocol

D.

Authentication Header

Questions # 2:

Which of the following is used to provide a protective shield for the data passing over the Internet?

Options:

A.

Firewall

B.

Proxy server

C.

Intrusion detection system

D.

Tunneling

Questions # 3:

Which of the following switches is used with Pslist command on the command line to show the statistics for all active threads on the system, grouping these threads with their owning process?

Options:

A.

Pslist -x

B.

Pslist -m

C.

Pslist -t

D.

Pslist -d

Questions # 4:

Which of the following is an expression of interference that triggers a false positive signal during an intrusion detection process performed by IDS?

Options:

A.

Confidence value

B.

Handshake

C.

Site policy

D.

Noise

Questions # 5:

Which of the following types of write blocker device uses one interface for one side and a different one for the other?

Options:

A.

Pros

B.

Tailgate.

C.

Indiff

D.

Native

Questions # 6:

Which of the following is not a valid Failed Logon EventID?

Options:

A.

535

B.

536

C.

534

D.

533

Questions # 7:

Which of the following is an open-source Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software?

Options:

A.

Nmap

B.

Internet bot

C.

Dsniff

D.

Nikto

Questions # 8:

You work as a Network Administrator for McRobert Inc. Your company has a Windows NT 4.0 TCP/IP-based network. You want to list the cache of NetBIOS names and IP addresses. Which of the following utilities will you use?

Options:

A.

TELNET

B.

NBTSTAT

C.

TRACERT

D.

NETSTAT

Questions # 9:

Which of the following networks relies on the tunneling protocol?

Options:

A.

Wide Area Network (WAN)

B.

Virtual Private Network (VPN)

C.

Local Area Network (LAN)

D.

Wireless Network

Questions # 10:

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

Options:

A.

Preparation

B.

gaining access

C.

Scanning

D.

Reconnaissance

Questions # 11:

Which of the following is true for XSS, SQL injection, and RFI?

Options:

A.

These are Trojans.

B.

These are hacking tools.

C.

These are types of Web application vulnerabilities.

D.

These are viruses.

Questions # 12:

Which of the following is used to provide a protective shield for the data passing over the Internet?

Options:

A.

Proxy server

B.

Intrusion detection system

C.

Firewall

D.

Tunneling

Questions # 13:

Steve works as a Network Administrator for Blue Tech Inc. All client computers in the company run the Windows Vista operating system. He often travels long distances on official duty. While traveling, he connects to the office server through his laptop by using remote desktop connection.

He wants to run an application that is available on the server of the company. When he connects to the server, he gets a message that the connection is blocked by the firewall. He returns to his office to resolve the issue. He opens the Windows Firewall Settings dialog box. What actions should he perform in the dialog box given below to accomplish the task?

Question # 13

Question # 13

Question # 13

Options:

A.
Questions # 14:

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dig

B.

Host

C.

NSLookup

D.

DSniff

Questions # 15:

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WPA

B.

WPA with Pre Shared Key

C.

WPA with 802.1X authentication

D.

WEP

Viewing page 1 out of 11 pages
Viewing questions 1-15 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.