Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCIA - GCIA – GIAC Certified Intrusion Analyst Practice Test

Page: 5 / 11
Total 508 questions

Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a remote location and a public IPv4 address, instead of public IPv6 address, has been assigned to the computer?

A.

ISATAP

B.

PortProxy

C.

6to4

D.

Teredo

Which of the following units of data does the data-link layer send from the network layer to the physical layer of the OSI model?

A.

Protocols

B.

Raw bits

C.

Data packets

D.

Data frames

E.

Data segments

John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?

A.

War dialing

B.

Sequence++ attack

C.

Phreaking

D.

Man-in-the-middle attack

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. Your manager requires you migrate the network to IPv6-enabled network without affecting any client computers. Which of the following actions will you take to accomplish the task?

A.

Configure stub zone on the DNS servers in the network.

B.

Configure GlobalNames zones on the DNS servers in the network.

C.

Install a new Windows Server 2003 DNS server computer on each domain and configure GlobalNames zones.

D.

Configure the client computers to use WINS.

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

A.

Stateful firewall

B.

Proxy-based firewall

C.

Packet filter firewall

D.

Endian firewall

An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network. Which of the following processes does an IDS perform?

Each correct answer represents a complete solution. Choose all that apply.

A.

Network traffic analysis

B.

Event log analysis

C.

Monitoring and analysis of user and system activity

D.

Statistical analysis of abnormal traffic patterns

Trinity wants to send an email to her friend. She uses the MD5 generator to calculate cryptographic hash of her email to ensure the security and integrity of the email. MD5 generator, which Trinity is using operates in two steps:

Creates check file

Verifies the check file

Which of the following MD5 generators is Trinity using?

A.

Secure Hash Signature Generator

B.

Mat-MD5

C.

Chaos MD5

D.

MD5 Checksum Verifier

You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer's log:

45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72

Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?

A.

41, UDP

B.

16, ICMP

C.

41, TCP

D.

16, UDP

Which of the following best describes the term protocol?

A.

The ability to move data through layers of the OSI model.

B.

The combination of cable type and access method used on a network.

C.

A set of rules.

D.

The permissible amount of data contained in a packet.

Which of the following commands prints out the headers of packets regarding the boolean expression?

A.

tcpdump

B.

vmstat

C.

iftop

D.

iostat

You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You want to get the protocol statistics and the active TCP/IP network connections of your computer. Which of the following will you use?

A.

IPSTAT

B.

SNMP

C.

ARP

D.

NBTSTAT

E.

NETSTAT

What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?

A.

Use the TRACERT command with the /pingname parameter.

B.

Ping the source host with its computer name.

C.

Ping the source host with its IP address.

D.

Check the IP statistics on the file server.

You are using the TRACERT utility to trace the route to passguide.com. You receive the following output:

Which of the following conclusions can you draw from viewing the output?

Each correct answer represents a complete solution. Choose two.

A.

Everything is fine.

B.

One of the routers on the path to the destination is not functional.

C.

The destination computer is not operational.

D.

The IP address of the destination computer is not resolved.

Which of the following protocols is used by TFTP as a file transfer protocol?

A.

UDP

B.

SNMP

C.

TCP

D.

SMTP

Which of the following statements about Secure Shell (SSH) are true?

Each correct answer represents a complete solution. Choose three.

A.

It is the core routing protocol of the Internet.

B.

It allows data to be exchanged using a secure channel between two networked devices.

C.

It was designed as a replacement for TELNET and other insecure shells.

D.

It is a network protocol used primarily on Linux and Unix based systems.