Exam Details

  • Exam Code
    :GCIA
  • Exam Name
    :GIAC Certified Intrusion Analyst
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :507 Q&As
  • Last Updated
    :Apr 18, 2024

GIAC GIAC Information Security GCIA Questions & Answers

  • Question 1:

    Which of the following can be applied as countermeasures against DDoS attacks? Each correct answer represents a complete solution. Choose all that apply.

    A. Limiting the amount of network bandwidth

    B. Blocking IP address

    C. Using LM hashes for passwords

    D. Using Intrusion detection systems

    E. Using the network-ingress filtering

  • Question 2:

    Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

    A. FAU

    B. FTK Imager

    C. Galleta

    D. Device Seizure

  • Question 3:

    Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used. He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about programs like Hping2 that can get into a network through covert channels. Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?

    A. Block ICMP type 13 messages

    B. Block all outgoing traffic on port 21

    C. Block all outgoing traffic on port 53

    D. Block ICMP type 3 messages

  • Question 4:

    Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

    A. Dsniff

    B. Snort

    C. Nikto

    D. Sniffer

  • Question 5:

    Which of the following methods is a behavior-based IDS detection method?

    A. Knowledge-based detection

    B. Protocol detection

    C. Statistical anomaly detection

    D. Pattern matching detection

  • Question 6:

    You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

    A. The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enabled.

    B. The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.

    C. The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enabled.

    D. The Enable Intrusion detection check box on the General tab page of the IP Packet FiltersProperties dialog box is not selected.

  • Question 7:

    Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

    A. Command injection attack

    B. Code injection attack

    C. Cross-Site Request Forgery

    D. Cross-Site Scripting attack

  • Question 8:

    You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?

    A. PING

    B. TELNET

    C. NETSTAT

    D. TRACERT

  • Question 9:

    Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

    A. CHKDSK /I

    B. CHKDSK /R /F

    C. CHKDSK /C /L

    D. CHKDSK /V /X

  • Question 10:

    Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?

    A. D

    B. N

    C. Z

    D. C

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCIA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.