Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIA Premium Access

View all detail and faqs for the GCIA exam


725 Students Passed

89% Average Score

93% Same Questions
Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions
Questions # 31:

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

Options:

A.

Propagating Cipher Block Chaining (PCBC) Mode

B.

Cipher Block Chaining (CBC) Mode

C.

Cipher Feedback (CFB) Mode

D.

Electronic Codebook (ECB) Mode

Questions # 32:

What is the maximum size of an IP datagram for Ethernet?

Options:

A.

4500 bytes

B.

1024 bytes

C.

1200 bytes

D.

1500 bytes

Questions # 33:

You work as a desktop administrator for BlueSkwer.com. You are logged on to a Windows 7 computer with administrator rights. You have run the 'netsh interface IPv6 show interface' command which displays the following:

Question # 33

What is the first interface index used for?

Options:

A.

6to4 tunneling

B.

MAC address

C.

Intra-Site Automatic Tunnel Addressing Protocol

D.

Loopback

Questions # 34:

Which of the following ports is used by e-mail clients to send request to connect to the server?

Options:

A.

Port 21

B.

Port 20

C.

Port 23

D.

Port 25

Questions # 35:

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

D.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

Questions # 36:

Which of the following groups provides tools and creates procedures for testing and validating computer forensic software?

Options:

A.

Society of Forensic Tools and Testing (SFTT)

B.

National Institute of Standards and Technology (NIST)

C.

Association of Computer Forensic Standards (ACFS)

D.

Forensic Tool and Standards Committee (FTSC)

Questions # 37:

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network. The network is connected to the Internet through a firewall. A user complains that he is unable to access the abc.com site. However, he can access all other sites. Which of the following tools will help you diagnose the problem?

Options:

A.

IPCONFIG

B.

ROUTE

C.

TELNET

D.

TRACERT

Questions # 38:

Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation?

Each correct answer represents a complete solution. Choose two.

Options:

A.

CRC

B.

HAVAL

C.

Twofish

D.

MD5

Questions # 39:

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

Options:

A.

FAU

B.

FTK Imager

C.

Galleta

D.

Device Seizure

Questions # 40:

Fill in the blank with the appropriate facts regarding IP version 6 (IPv6).

IP addressing version 6 uses_____ -bit address. Its____ IP address assigned to a single host allows the host to send and receive data.

Options:

A.

IP addressing version 6 uses 128 -bit address. Its unicast IP address assigned to a single host allows the host to send and receive data.

Questions # 41:

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Sensor

B.

Gateway

C.

Firewall

D.

Modem

E.

Console

Questions # 42:

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

Options:

A.

Propagating Cipher Block Chaining (PCBC) Mode

B.

Cipher Block Chaining (CBC) Mode

C.

Electronic Codebook (ECB) Mode

D.

Cipher Feedback (CFB) Mode

Questions # 43:

At which layers of the OSI and TCP/IP models does IP addressing function?

Options:

A.

OSI Layer 5 and TCP/IP Transport Layer

B.

OSI Layer 2 and TCP/IP Network Layer

C.

OSI Layer 4 and TCP/IP Application Layer

D.

OSI Layer 3 and TCP/IP Internet Layer

Questions # 44:

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

Options:

A.

Enable verbose logging on the firewall

B.

Install a network-based IDS

C.

Install a DMZ firewall

D.

Install a host-based IDS

Questions # 45:

Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers. Which of the following programs can Mark use to fulfill this requirement?

Options:

A.

Microsoft Internet Security & Acceleration Server (ISA)

B.

Wingate

C.

Sniffer

D.

SOCKS

Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.