Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCIA - GCIA – GIAC Certified Intrusion Analyst Practice Test

Page: 10 / 11
Total 508 questions

Which of the following file systems is designed by Sun Microsystems?

A.

NTFS

B.

CIFS

C.

ZFS

D.

ext2

Which of the following DNS resource records is used to resolve a host name to an IPv6 address?

A.

AAAA

B.

HINFO

C.

CNAME

D.

A

Which of the following hacking tools provides shell access over ICMP?

A.

John the Ripper

B.

Loki

C.

Nessus

D.

Nmap

Which of the following is not a Denial of Service (DoS) attack?

A.

Smurf attack

B.

Code injection attack

C.

Ping of Death attack

D.

Teardrop attack

You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

A.

Site-local

B.

Global unicast

C.

Local-link

D.

Loopback

Which of the following DoS attacks points the Central Processing Unit (CPU) to a non-existent memory location causing the running process to end abruptly?

A.

Buffer Overflow attack

B.

Teardrop attack

C.

Fraggle attack

D.

Snork attack

Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?

Each correct answer represents a complete solution. Choose all that apply.

A.

All ideas present in the investigative report should flow logically from facts to conclusions.

B.

Opinion of a lay witness should be included in the investigative report.

C.

The investigative report should be understandable by any reader.

D.

There should not be any assumptions made about any facts while writing the investigative report.

What is the maximum size of an IP datagram for Ethernet?

A.

1200 bytes

B.

1024 bytes

C.

1500 bytes

D.

4500 bytes

Which of the following parts of hard disk in Mac OS X File system stores information related to the files?

A.

Resource fork

B.

Data fork

C.

System fork

D.

Log fork

Which of the following attacks is used to hack simple alphabetical passwords?

A.

Dictionary-based attack

B.

Sniffing

C.

Man-in-the-middle attack

D.

Black hat attack

How many bits does IPv6 use in IP addresses?

A.

40 bits

B.

32 bits

C.

64 bits

D.

128 bits

Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

A.

CHKDSK /I

B.

CHKDSK /R /F

C.

CHKDSK /C /L

D.

CHKDSK /V /X

This tool is known as __________.

A.

Kismet

B.

Absinthe

C.

NetStumbler

D.

THC-Scan

Which of the following statements are true about snort?

Each correct answer represents a complete solution. Choose all that apply.

A.

It develops a new signature to find vulnerabilities.

B.

It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS clients.

C.

It encrypts the log file using the 256 bit AES encryption scheme algorithm.

D.

It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connections.

Which of the following is a checksum algorithm?

A.

Dsniff

B.

Adler-32

C.

Hash buster

D.

Snort