Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCIA - GCIA – GIAC Certified Intrusion Analyst Practice Test

Page: 9 / 11
Total 508 questions

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

A.

These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

B.

These are the threats that originate from within the organization.

C.

These are the threats intended to flood a network with large volumes of access requests.

D.

These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

Routers work at which layer of the OSI reference model?

A.

Transport

B.

Physical

C.

Presentation

D.

Network

Which of the following tools are used to determine the hop counts of an IP packet?

Each correct answer represents a complete solution. Choose two.

A.

TRACERT

B.

Ping

C.

IPCONFIG

D.

Netstat

You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?

A.

PING

B.

TELNET

C.

NETSTAT

D.

TRACERT

Which of the following is the process of categorizing attack alerts produced from IDS?

A.

Site policy implementation

B.

Blocking

C.

Intrusion classify

D.

Alarm filtering

Which of the following wireless network standards operates on the 5 GHz band and transfers data at a rate of 54 Mbps?

A.

802.11g

B.

802.11a

C.

802.11u

D.

802.11b

What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

A.

Sircam

B.

Stoner

C.

Code Red

D.

Brain

What is the process of detecting unauthorized access known as?

A.

Intrusion detection

B.

Misuse detection

C.

Anomaly detection

D.

Integrity detection

Which of the following algorithms produces a digital signature which is used to authenticate the bit-stream images?

A.

MD6

B.

MD5

C.

BOINIC

D.

HashClash

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

A.

Command injection attack

B.

Code injection attack

C.

Cross-Site Request Forgery

D.

Cross-Site Scripting attack

Which of the following utilities allows to view all files including invisible files and folders on a Macintosh OS X?

A.

Directory Scan

B.

Folder Scan

C.

File Scan

D.

System Scan

Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

A.

Data control and Media Access control

B.

Logical control and Link control

C.

Logical Link control and Media Access control

D.

Machine Link control and Logical Link control

Which of the following is NOT an Intrusion Detection System?

A.

Fragroute

B.

Stunnel

C.

Samhain

D.

AIDE

What is the name of the group of blocks which contains information used by the operating system in Linux system?

A.

logblock

B.

Bootblock

C.

Superblock

D.

Systemblock

Which of the following statements are true about an IPv6 network?

Each correct answer represents a complete solution. Choose all that apply.

A.

For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.

B.

It increases the number of available IP addresses.

C.

It provides improved authentication and security.

D.

It uses 128-bit addresses.

E.

It uses longer subnet masks than those used in IPv4.