GIAC GCIA - GCIA – GIAC Certified Intrusion Analyst Practice Test
Which of the following is computed from an arbitrary block of digital data for the purpose of detecting accidental errors?
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following tools is used to recover data and partitions, and can run on Windows, Linux, SunOS, and Macintosh OS X operating systems?
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer. You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?
Which of the following is used to provide a protective shield for the data passing over the Internet?
What is the size of a subnet in IPv6?
Which of the following is used to hash the information in Netcat?
What netsh command should be run to enable IPv6 routing?
Each correct answer represents a part of the solution. Choose two.
Which of the following monitors program activities and modifies malicious activities on a system?
John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?
Which of the following tools is described below?
It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.
________ is a command-line tool that can check the DNS registration of a domain controller.
Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?
Which of the following malicious programs changes its signature continuously to be invisible to IDS?
Which of the following partitions contains the system files that are used to start the operating system?