Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIA Premium Access

View all detail and faqs for the GCIA exam


725 Students Passed

89% Average Score

93% Same Questions
Viewing page 10 out of 11 pages
Viewing questions 136-150 out of questions
Questions # 136:

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

Options:

A.

Dsniff

B.

Snort

C.

Nikto

D.

Sniffer

Questions # 137:

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Options:

A.

Command injection attack

B.

Code injection attack

C.

Cross-Site Request Forgery

D.

Cross-Site Scripting attack

Questions # 138:

In which of the following attacks does a hacker imitate a DNS server and obtain the entire DNS database?

Options:

A.

Illicit zone transfer attack

B.

DNS poisoning attack

C.

Illicit poisoning attack

D.

DNS transfer attack

Questions # 139:

Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?

Options:

A.

Asterisk Logger

B.

Access PassView

C.

Mail Pass View

D.

MessenPass

Questions # 140:

Which of the following file systems is designed by Sun Microsystems?

Options:

A.

NTFS

B.

CIFS

C.

ZFS

D.

ext2

Questions # 141:

Which of the following is NOT the functional area of a forensic laboratory?

Options:

A.

Network facilities

B.

Evidence storage

C.

Administrative area

D.

Research area

Questions # 142:

Which of the following parts of hard disk in Mac OS X File system stores information related to the files?

Options:

A.

Resource fork

B.

Data fork

C.

System fork

D.

Log fork

Questions # 143:

What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

Options:

A.

Sircam

B.

Stoner

C.

Code Red

D.

Brain

Questions # 144:

Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?

Options:

A.

disable dnsserver

B.

alter dnsserver

C.

delete dnsserver

D.

remove dnsserver

Questions # 145:

You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?

Options:

A.

PING

B.

TELNET

C.

NETSTAT

D.

TRACERT

Questions # 146:

Which of the following is NOT an Intrusion Detection System?

Options:

A.

Fragroute

B.

Stunnel

C.

Samhain

D.

AIDE

Questions # 147:

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

Options:

A.

These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

B.

These are the threats that originate from within the organization.

C.

These are the threats intended to flood a network with large volumes of access requests.

D.

These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

Questions # 148:

Which of the following statements are true about snort?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It develops a new signature to find vulnerabilities.

B.

It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS clients.

C.

It encrypts the log file using the 256 bit AES encryption scheme algorithm.

D.

It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connections.

Questions # 149:

Which of the following types of attacks uses ICMP to consume bandwidth and crash sites?

Options:

A.

MITM attack

B.

SYN flood attack

C.

TFN attack

D.

XSS attack

Questions # 150:

Which of the following is the default port for Simple Network Management Protocol (SNMP)?

Options:

A.

TCP port 110

B.

TCP port 25

C.

TCP port 80

D.

UDP port 161

Viewing page 10 out of 11 pages
Viewing questions 136-150 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.