Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIA Premium Access

View all detail and faqs for the GCIA exam


725 Students Passed

89% Average Score

93% Same Questions
Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
Questions # 76:

Sasha wants to add an entry to your DNS database for your mail server. Which of the following types of resource records will she use to accomplish this?

Options:

A.

ANAME

B.

SOA

C.

MX

D.

CNAME

Questions # 77:

Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?

Each correct answer represents a complete solution. Choose two.

Options:

A.

SYN flood attack

B.

Teardrop attack

C.

Land attack

D.

Ping of Death attack

Questions # 78:

You work as a Network Administrator for McRobert Inc. You plan to configure your Windows Vista computer for Internet access. To achieve this, which of the following communication protocols needs to be bound to the dial-up adapter?

Options:

A.

TCP/IP

B.

DLC

C.

NetBEUI

D.

AppleTalk

Questions # 79:

Which of the following are not functions of the SNORT application?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Packet logging

B.

Virus detection

C.

Hard disk drive scanning

D.

Packet sniffing

E.

Intrusion detection

Questions # 80:

Which of the following tools can be used for passive OS fingerprinting?

Options:

A.

dig

B.

nmap

C.

ping

D.

tcpdump

Questions # 81:

Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

Options:

A.

Application protocol-based intrusion detection system (APIDS)

B.

Protocol-based intrusion detection system (PIDS)

C.

Network intrusion detection system (NIDS)

D.

Host-based intrusion detection system (HIDS)

Questions # 82:

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

True negative

B.

True positive

C.

False negative

D.

False positive

Questions # 83:

Which of the following is used to detect the bad sectors in a hard disk under Linux environment?

Options:

A.

Badblocks

B.

CheckDisk

C.

ScanDisk

D.

CHKDSK

Questions # 84:

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Text Semagrams

B.

Linguistic steganography

C.

Technical steganography

D.

Perceptual masking

Questions # 85:

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.

Signature-based

B.

Network-based

C.

File-based

D.

Anomaly-based

Questions # 86:

What are the advantages of stateless autoconfigration in IPv6?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Ease of use.

B.

It provides basic authentication to determine which systems can receive configuration data

C.

No server is needed for stateless autoconfigration.

D.

No host configuration is necessary.

Questions # 87:

Which of the following can be monitored by using the host intrusion detection system (HIDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Computer performance

B.

File system integrity

C.

Storage space on computers

D.

System files

Questions # 88:

Which of the following statements is NOT true about FAT16 file system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

FAT16 file system supports Linux operating system.

B.

FAT16 file system supports file-level compression.

C.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.

D.

FAT16 does not support file-level security.

Questions # 89:

Which of the following protocols is used by e-mail servers to send messages?

Options:

A.

SNMP

B.

FTP

C.

POP3

D.

SMTP

E.

HTTP

Questions # 90:

What is the order of the extension headers that is followed by IPv6?

Options:

A.

Destination Options (first), Routing, IPv6 header, Hop-by-Hop, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

B.

Routing, Hop-by-Hop, Destination Options (first), Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

C.

Fragment, Routing, Hop-by-Hop, Destination Options (first), Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

D.

IPv6 header, Hop-by-Hop, Destination Options (first), Routing, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.