Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GCIA - GCIA – GIAC Certified Intrusion Analyst Practice Test

Page: 1 / 11
Total 508 questions

Which of the following is computed from an arbitrary block of digital data for the purpose of detecting accidental errors?

A.

Hash buster

B.

Firewall

C.

Checksum

D.

Hash filter

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Brute Force attack

B.

Dictionary attack

C.

Rule based attack

D.

Hybrid attack

Which of the following tools is used to recover data and partitions, and can run on Windows, Linux, SunOS, and Macintosh OS X operating systems?

A.

GetDataBack

B.

Acronis Recovery Expert

C.

Active@ Disk Image

D.

TestDisk

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer. You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?

A.

start /w ocsetup DnsServercorerole

B.

net start "dns server"

C.

start /w ocsetup DNS-Server-Core-Role

D.

start /w ocsetup DnsServer

Which of the following is used to provide a protective shield for the data passing over the Internet?

A.

Proxy server

B.

Intrusion detection system

C.

Firewall

D.

Tunneling

What is the size of a subnet in IPv6?

A.

264 addresses

B.

232 addresses

C.

262 addresses

D.

2128 addresses

Which of the following is used to hash the information in Netcat?

A.

MD5

B.

SHA-256

C.

MD5deep

D.

SHA-1

What netsh command should be run to enable IPv6 routing?

Each correct answer represents a part of the solution. Choose two.

A.

netsh interface IPv6 show interface

B.

netsh interface IPv6 add routes

C.

netsh interface IPv6 set interface

D.

netsh interface IPv6 add address

Which of the following monitors program activities and modifies malicious activities on a system?

A.

RADIUS

B.

NIDS

C.

Back door

D.

HIDS

John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?

A.

Sequence++ attack

B.

Phreaking

C.

Man-in-the-middle attack

D.

War dialing

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

A.

LIDS

B.

Dsniff

C.

Cain

D.

Libnids

________ is a command-line tool that can check the DNS registration of a domain controller.

A.

NBTSTAT

B.

NETSH

C.

DNSCMD

D.

DCDIAG

Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?

A.

Cache memory test failed

B.

Mother board timer not operational

C.

Display memory error

D.

Processor failure

Which of the following malicious programs changes its signature continuously to be invisible to IDS?

A.

Boot sector virus

B.

Trojan

C.

Malware

D.

Polymorphic virus

Which of the following partitions contains the system files that are used to start the operating system?

A.

Boot partition

B.

System partition

C.

Secondary partition

D.

Primary partition