we provide Simulation GIAC GCIA actual exam which are the best for clearing GCIA test, and to get certified by GIAC GIAC Certified Intrusion Analyst. The GCIA Questions & Answers covers all the knowledge points of the real GCIA exam. Crack your GIAC GCIA Exam with latest dumps, guaranteed!
Online GCIA free questions and answers of New Version:
NEW QUESTION 1
Which of the following is computed from an arbitrary block of digital data for the purpose of detecting accidental errors?
Answer: C
NEW QUESTION 2
John works as a Network Administrator for DigiNet Inc. He wants to investigate failed logon attempts to a network. He uses Log Parser to detail out the failed logons over a specific time frame. He uses the following commands and query to list all failed logons on a specific date:
logparser.exe file:FailedLogons.sql -i:EVT -o:datagrid
SELECT
timegenerated AS LogonTime,
extract_token(strings, 0, '|') AS UserName
FROM Security
WHERE EventID IN (529;
530;
531;
532;
533;
534;
535;
537;
539)
AND to_string(timegenerated,'yyyy-MM-dd HH:mm:ss') like '2004-09%'
After investigation, John concludes that two logon attempts were made by using an expired account. Which of the following EventID refers to this failed logon?
Answer: A
NEW QUESTION 3
Which of the following attacks involves multiple compromised systems to attack a single target?
Answer: B
NEW QUESTION 4
Which of the following applications cannot proactively detect anomalies related to a computer?
Answer: A
NEW QUESTION 5
Which of the following classes refers to the fire involving electricity?
Answer: D
NEW QUESTION 6
What is the maximum size of an IP datagram for Ethernet?
Answer: C
NEW QUESTION 7
Which of the following command-line utilities is used to show the state of current TCP/IP connections?
Answer: C
NEW QUESTION 8
Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?
Answer: D
NEW QUESTION 9
Which of the following is the default port for Hypertext Transfer Protocol (HTTP)?
Answer: C
NEW QUESTION 10
Which of the following port numbers are valid ephemeral port numbers?
Each correct answer represents a complete solution. Choose two.
Answer: BD
NEW QUESTION 11
The National Shoes Inc. has an SNMP enabled router installed on its network. IT Manager wants to monitor all SNMP traffic generated by the router. So, he installs a Network Monitor on a Windows2000 Server computer on the network. The router is configured to send traps to an SNMP manager installed on another server. He wants to get a notification whenever the network router raises an SNMP trap. What will he do to achieve this?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a part of the solution. Choose two.
Answer: DE
NEW QUESTION 12
Which of the following commands displays the IPX routing table entries?
Answer: C
NEW QUESTION 13
Which of the following standard file formats is used by Apple's iPod to store contact information?
Answer: B
NEW QUESTION 14
Which of the following best describes the term protocol?
Answer: C
NEW QUESTION 15
At which layers of the OSI and TCP/IP models does IP addressing function?
Answer: D
NEW QUESTION 16
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. You have recently come to know about the Slammer worm, which attacked computers in 2003 and doubled the number of infected hosts every 9 seconds or so. Slammer infected 75000 hosts in the first 10 minutes of the attack. To mitigate such security threats, you want to configure security tools on the network. Which of the following tools will you use?
Answer: A
NEW QUESTION 17
You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline. This type of IDS is called __________.
Answer: A
NEW QUESTION 18
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.
A branch office is connected to the headquarters through a T1 line. Users at the branch office report poor voice quality on the IP phone while communicating with the headquarters. You find that an application, named WorkReport, at the branch office is suffocating bandwidth by sending large packets for file synchronization. You need to improve the voice quality on the IP phone. Which of the following steps will you choose to accomplish this?
Answer: D
NEW QUESTION 19
Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.
Answer: AB
NEW QUESTION 20
Which of the following commands in MQC tool matches IPv4 and IPv6 packets when IP parameter is missing?
Answer: C
NEW QUESTION 21
......
Thanks for reading the newest GCIA exam dumps! We recommend you to try the PREMIUM Downloadfreepdf.net GCIA dumps in VCE and PDF here: https://www.downloadfreepdf.net/GCIA-pdf-download.html (508 Q&As Dumps)