Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIA Premium Access

View all detail and faqs for the GCIA exam


725 Students Passed

89% Average Score

93% Same Questions
Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following standard file formats is used by Apple's iPod to store contact information?

Options:

A.

HFS+

B.

vCard

C.

FAT32

D.

hCard

Questions # 47:

Users on a TCP/IP network are able to ping resources using IP addresses. However, they are unable to connect to those resources through their host names. A malfunction or failure of which of the following servers may be the cause of the issue?

Options:

A.

Proxy

B.

DHCP

C.

DNS

D.

WINS

Questions # 48:

Which of the following work as traffic monitoring tools in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

MRTG

B.

John the Ripper

C.

IPTraf

D.

Ntop

Questions # 49:

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

Options:

A.

Man trap

B.

Network Intrusion Detection System (NIDS)

C.

Biometric device

D.

Host Intrusion Detection System (HIDS)

Questions # 50:

Which of the following conclusions can be drawn from viewing the given output generated by the PING command-line utility?

Question # 50

Options:

A.

The network bandwidth is heavily utilized.

B.

The IP address of the destination computer is not resolved.

C.

There is no connectivity between the source and the destination computer.

D.

The hub is not working.

Questions # 51:

Nathan works as a professional Ethical Hacker. He wants to see all open TCP/IP and UDP ports of his computer. Nathan uses the netstat command for this purpose but he is still unable to map open ports to the running process with PID, process name, and path. Which of the following commands will Nathan use to accomplish the task?

Options:

A.

ping

B.

Psloggedon

C.

Pslist

D.

fport

Questions # 52:

Adam works as a Security Analyst for Umbrella Inc. He is performing real-time traffic analysis on IP networks using Snort. Adam is facing problems in analyzing intrusion data. Which of the following software combined with Snort can Adam use to get a visual representation of intrusion data?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Basic Analysis and Security Engine (BASE)

B.

sguil

C.

KFSensor

D.

OSSIM

Questions # 53:

Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot. Andrew wants to check the booting process. He suspects that an error persists in the bootloader of Mac OS X. Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?

Options:

A.

LILO

B.

BootX

C.

NT Loader

D.

GRUB

Questions # 54:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Options:

A.

PsExec

B.

PsList

C.

Fpipe

D.

Cain

Questions # 55:

Which of the following firewalls keeps track of the state of network connections traveling across the network?

Options:

A.

Stateful firewall

B.

Application-level firewall

C.

Packet filtering firewall

D.

Circuit-level firewall

Questions # 56:

Which of the following is a signature-based intrusion detection system (IDS) ?

Options:

A.

Snort

B.

StealthWatch

C.

RealSecure

D.

Tripwire

Questions # 57:

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server

2008 network environment. The servers on the network run Windows Server 2008 R2. All client computers on the network run Windows 7 Ultimate. You have configured DirectAccess feature on the laptop of few sales managers so that they can access corporate network from remote locations. Their laptops run Windows 7 Ultimate. Which of the following options does the DirectAccess use to keep data safer while traveling through travels public networks?

Options:

A.

IPv6-over-IPsec

B.

IPSec-over-IPv4

C.

VPN

D.

SSL

Questions # 58:

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

Options:

A.

Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces

B.

Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces

C.

Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system

D.

Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

Questions # 59:

You work as a Network Administrator for Tech2tech Inc. You have configured a network-based IDS for your company.

You have physically installed sensors at all key positions throughout the network such that they all report to the command console.

What will be the key functions of the sensors in such a physical layout?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To collect data from operating system logs

B.

To notify the console with an alert if any intrusion is detected

C.

To analyze for known signatures

D.

To collect data from Web servers

Questions # 60:

Which of the following is the default port for File Transport Protocol (FTP)?

Options:

A.

21

B.

25

C.

23

D.

80

Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.