Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIA Premium Access

View all detail and faqs for the GCIA exam


725 Students Passed

89% Average Score

93% Same Questions
Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions
Questions # 121:

Which of the following is the process of categorizing attack alerts produced from IDS?

Options:

A.

Site policy implementation

B.

Blocking

C.

Intrusion classify

D.

Alarm filtering

Questions # 122:

Which of the following can be applied as countermeasures against DDoS attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Limiting the amount of network bandwidth

B.

Blocking IP address

C.

Using LM hashes for passwords

D.

Using Intrusion detection systems

E.

Using the network-ingress filtering

Questions # 123:

Which of the following DOS commands is used to configure network protocols?

Options:

A.

netsh

B.

netsvc

C.

netstat

D.

ipconfig

Questions # 124:

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Knowledge-based detection

B.

Protocol detection

C.

Statistical anomaly detection

D.

Pattern matching detection

Questions # 125:

What is the process of detecting unauthorized access known as?

Options:

A.

Intrusion detection

B.

Misuse detection

C.

Anomaly detection

D.

Integrity detection

Questions # 126:

Which of the following tools are used to determine the hop counts of an IP packet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

TRACERT

B.

Ping

C.

IPCONFIG

D.

Netstat

Questions # 127:

What is the name of the group of blocks which contains information used by the operating system in Linux system?

Options:

A.

logblock

B.

Bootblock

C.

Superblock

D.

Systemblock

Questions # 128:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Options:

A.

PsExec

B.

PsList

C.

Fpipe

D.

Cain

Questions # 129:

You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

Options:

A.

Site-local

B.

Global unicast

C.

Local-link

D.

Loopback

Questions # 130:

Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?

Options:

A.

Ntoskrnl.exe

B.

Advapi32.dll

C.

Kernel32.dll

D.

Win32k.sys

Questions # 131:

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

Options:

A.

The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enabled.

B.

The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.

C.

The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enabled.

D.

The Enable Intrusion detection check box on the General tab page of the IP Packet Filters

Properties dialog box is not selected.

Questions # 132:

Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

Options:

A.

Data control and Media Access control

B.

Logical control and Link control

C.

Logical Link control and Media Access control

D.

Machine Link control and Logical Link control

Questions # 133:

Which of the following is not a Denial of Service (DoS) attack?

Options:

A.

Smurf attack

B.

Code injection attack

C.

Ping of Death attack

D.

Teardrop attack

Questions # 134:

Which of the following algorithms produces a digital signature which is used to authenticate the bit-stream images?

Options:

A.

MD6

B.

MD5

C.

BOINIC

D.

HashClash

Questions # 135:

Routers work at which layer of the OSI reference model?

Options:

A.

Transport

B.

Physical

C.

Presentation

D.

Network

Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.