Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror
Pass the GIAC Security Administration GCIA Questions and answers with ExamsMirror
Exam GCIA Premium Access
View all detail and faqs for the GCIA exam
725 Students Passed
89% Average Score
93% Same Questions
Sasha wants to add an entry to your DNS database for your mail server. Which of the following types of resource records will she use to accomplish this?
Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?
Each correct answer represents a complete solution. Choose two.
You work as a Network Administrator for McRobert Inc. You plan to configure your Windows Vista computer for Internet access. To achieve this, which of the following communication protocols needs to be bound to the dial-up adapter?
Which of the following are not functions of the SNORT application?
Each correct answer represents a complete solution. Choose two.
Which of the following tools can be used for passive OS fingerprinting?
Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.
Which of the following is used to detect the bad sectors in a hard disk under Linux environment?
Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
What are the advantages of stateless autoconfigration in IPv6?
Each correct answer represents a part of the solution. Choose three.
Which of the following can be monitored by using the host intrusion detection system (HIDS)?
Each correct answer represents a complete solution. Choose two.
Which of the following statements is NOT true about FAT16 file system?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following protocols is used by e-mail servers to send messages?
What is the order of the extension headers that is followed by IPv6?
TOP CODES
Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.