GIAC GCIA - GCIA – GIAC Certified Intrusion Analyst Practice Test
Which of the following file systems is designed by Sun Microsystems?
Which of the following DNS resource records is used to resolve a host name to an IPv6 address?
Which of the following hacking tools provides shell access over ICMP?
Which of the following is not a Denial of Service (DoS) attack?
You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?
Which of the following DoS attacks points the Central Processing Unit (CPU) to a non-existent memory location causing the running process to end abruptly?
Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?
Each correct answer represents a complete solution. Choose all that apply.
What is the maximum size of an IP datagram for Ethernet?
Which of the following parts of hard disk in Mac OS X File system stores information related to the files?
Which of the following attacks is used to hack simple alphabetical passwords?
How many bits does IPv6 use in IP addresses?
Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?
This tool is known as __________.
Which of the following statements are true about snort?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is a checksum algorithm?
