Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCIA - GCIA – GIAC Certified Intrusion Analyst Practice Test

Page: 7 / 11
Total 508 questions

Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?

A.

Asterisk logger

B.

Access Pass View

C.

FAU

D.

Galleta

Which of the following tools is used to detect spam email without checking the content?

A.

Kismet

B.

EtherApe

C.

DCC

D.

Sniffer

Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?

A.

Vedit

B.

WinHex

C.

HxD

D.

Evidor

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

    It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.

    It is commonly used for the following purposes:

A.

War driving

B.

Detecting unauthorized access points

C.

Detecting causes of interference on a WLAN

D.

WEP ICV error tracking

E.

Making Graphs and Alarms on 802.11 Data, including Signal Strength

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses. Which of the following worms has attacked the computer?

A.

Ramen

B.

LoveLetter

C.

Code red

D.

Nimda

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?

Each correct answer represents a complete solution. Choose all that apply.

A.

Names of the victims

B.

Date and time of incident

C.

Nature of harassment

D.

Location of each incident

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used.

He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about programs like Hping2 that can get into a network through covert channels.

Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?

A.

Block ICMP type 13 messages

B.

Block all outgoing traffic on port 21

C.

Block all outgoing traffic on port 53

D.

Block ICMP type 3 messages

You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?

A.

ping -a

B.

ping -4

C.

ping -t

D.

ping –l

Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc.

Which of the following types of Cross-Site Scripting attack Ryan intends to do?

A.

Document Object Model (DOM)

B.

Non persistent

C.

SAX

D.

Persistent

Which of the following attacks involves multiple compromised systems to attack a single target?

A.

Brute force attack

B.

DDoS attack

C.

Replay attack

D.

Dictionary attack

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

A.

Propagating Cipher Block Chaining (PCBC) Mode

B.

Cipher Block Chaining (CBC) Mode

C.

Electronic Codebook (ECB) Mode

D.

Cipher Feedback (CFB) Mode

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

History folder

B.

Download folder

C.

Cookies folder

D.

Temporary Internet Folder

You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?

A.

NBTSTAT -s

B.

NETSTAT -s

C.

NETSTAT -n

D.

NBTSTAT -n

Which of the following conclusions can be drawn from viewing the given output generated by the PING command-line utility?

A.

The network bandwidth is heavily utilized.

B.

The IP address of the destination computer is not resolved.

C.

There is no connectivity between the source and the destination computer.

D.

The hub is not working.

Which of the following is included in a memory dump file?

A.

List of loaded drivers

B.

Security ID

C.

Stop message and its parameters

D.

The kernel-mode call stack for the thread that stopped the process from execution