Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIA Premium Access

View all detail and faqs for the GCIA exam


725 Students Passed

89% Average Score

93% Same Questions
Viewing page 7 out of 11 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which of the following utilities provides information as per the format given below?

Question # 91

Options:

A.

TRACERT

B.

NBTSTAT

C.

NETSTAT

D.

PING

Questions # 92:

Which of the following statements about FTP is true?

Options:

A.

It holds files transmitted through POP3 mail.

B.

It manages network devices.

C.

It connects file servers on the World Wide Web.

D.

It transfers files between computers.

E.

It allows password free file transfers.

Questions # 93:

Adam, a malicious hacker is running a scan. Statistics of the scan is as follows:

Question # 93

Which of the following types of port scan is Adam running?

Options:

A.

XMAS scan

B.

ACK scan

C.

Idle scan

D.

FIN scan

Questions # 94:

Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Close existing email account and open new email account.

B.

Forward a copy of the spam to the ISP to make the ISP conscious of the spam.

C.

Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.

D.

Send an email to the domain administrator responsible for the initiating IP address.

Questions # 95:

You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline. This type of IDS is called __________.

Options:

A.

Anomaly Based

B.

Reactive IDS

C.

Passive IDS

D.

Signature Based

Questions # 96:

Which of the following is the primary TCP/IP protocol used to transfer text and binary files over the Internet?

Options:

A.

PPTP

B.

SNMP

C.

FTP

D.

SMTP

Questions # 97:

You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer's log:

45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72

Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?

Options:

A.

41, UDP

B.

16, ICMP

C.

41, TCP

D.

16, UDP

Questions # 98:

What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?

Options:

A.

Use the TRACERT command with the /pingname parameter.

B.

Ping the source host with its computer name.

C.

Ping the source host with its IP address.

D.

Check the IP statistics on the file server.

Questions # 99:

Which of the following types of scan does not open a full TCP connection?

Options:

A.

ACK scan

B.

FIN scan

C.

Stealth scan

D.

Idle scan

Questions # 100:

Which of the following is the process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks?

Options:

A.

Alarm filtering

B.

Confidence value

C.

Reactive system

D.

Site policy

Questions # 101:

Which of the following tools is used to store the contents of a TDB (Trivial Database) file to the standard output when debugging problems with TDB files?

Options:

A.

tcpdump

B.

pdbedit

C.

Winbindd

D.

tdbdump

Questions # 102:

Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

Options:

A.

SSH

B.

SUDO

C.

Apache

D.

Snort

Questions # 103:

You work as a Network Administrator for NetTech Inc. You want to know the local IP address, subnet mask, and default gateway of a NIC in a Windows 98 computer. Which of the following utilities will you use to accomplish this ?

Options:

A.

TRACERT

B.

WINIPCFG

C.

NETSTAT

D.

FDISK

Questions # 104:

Which of the following utilities produces the output shown in the image below?

Question # 104

Options:

A.

IPCONFIG

B.

PING

C.

PATHPING

D.

TRACERT

Questions # 105:

Which of the following are open-source vulnerability scanners?

Options:

A.

Nessus

B.

NetRecon

C.

Hackbot

D.

Nikto

Viewing page 7 out of 11 pages
Viewing questions 91-105 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.