Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIA Premium Access

View all detail and faqs for the GCIA exam


725 Students Passed

89% Average Score

93% Same Questions
Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions
Questions # 106:

The following output is generated by running the show ip route command:

RouterA#show ip route

< - - Output Omitted for brevity - ->

Question # 106

Which next hop address will RouterA use in forwarding traffic to 10.10.100.0/24?

Options:

A.

172.18.50.1

B.

192.168.10.0

C.

172.18.1.1

D.

172.18.60.1

Questions # 107:

Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?

Options:

A.

Caching proxy server

B.

Web proxy server

C.

Forced proxy server

D.

Open proxy server

Questions # 108:

Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?

Options:

A.

tcpdump -A file_name

B.

tcpdump -D file_name

C.

tcpdump -X file_name

D.

tcpdump -F file_name

Questions # 109:

Which of the following is allowed by a company to be addressed directly from the public network and is hardened to screen the rest of its network from security exposure?

Options:

A.

Intrusion detection system

B.

A computer installed in the network and configured with sender reputation

C.

bastion host

D.

Exchange ActiveSync

Questions # 110:

Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

Options:

A.

DriveSpy

B.

Ontrack

C.

Device Seizure

D.

Forensic Sorter

Questions # 111:

Which of the following statements best describes the string matching method of signature analysis?

Options:

A.

String matching searches specific strings that may indicate an attack.

B.

String matching examines multiple fields from different protocols, such as source address, destination port, or TCP flags.

C.

In string matching, each packet is wrapped in predefined layers of different protocols.

D.

In string matching, an incoming packet is compared, byte by byte, with a single signature, a string of code.

Questions # 112:

What are the advantages of an application layer firewall?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It provides detailed logging information for management purposes.

B.

It prevents most of the spoofing and DoS attacks.

C.

It monitors and filters data.

D.

It provides authentication to a device.

Questions # 113:

Which of the following units of data does the data-link layer send from the network layer to the physical layer of the OSI model?

Options:

A.

Protocols

B.

Raw bits

C.

Data packets

D.

Data frames

E.

Data segments

Questions # 114:

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate computer of an unfaithful employee of SecureEnet Inc. Suspect's computer runs on Windows operating system. Which of the following sources will Adam investigate on a Windows host to collect the electronic evidences?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Allocated cluster

B.

Swap files

C.

Slack spaces

D.

Unused and hidden partition

Questions # 115:

Which of the following attacks is used to hack simple alphabetical passwords?

Options:

A.

Dictionary-based attack

B.

Sniffing

C.

Man-in-the-middle attack

D.

Black hat attack

Questions # 116:

Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?

Options:

A.

alter dnsserver

B.

delete dnsserver

C.

disable dnsserver

D.

remove dnsserver

Questions # 117:

Which of the following firewalls depends on the three-way handshake of the TCP protocol?

Options:

A.

Stateful firewall

B.

Endian firewall

C.

Proxy-based firewall

D.

Packet filter firewall

Questions # 118:

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

Options:

A.

Linux Live CD

B.

DOS boot disk

C.

Secure Authentication for EnCase (SAFE)

D.

EnCase with a hardware write blocker

Questions # 119:

Which of the following commands is a Packet sniffer?

Options:

A.

tcpdump

B.

strace

C.

nmap

D.

tail

Questions # 120:

Which of the following TCP/UDP port is used by the toolkit program netstat?

Options:

A.

Port 23

B.

Port 15

C.

Port 7

D.

Port 69

Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.