Exam Details

  • Exam Code
    :GCIA
  • Exam Name
    :GIAC Certified Intrusion Analyst
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :507 Q&As
  • Last Updated
    :May 05, 2024

GIAC GIAC Information Security GCIA Questions & Answers

  • Question 31:

    Which of the following TCP/UDP port is used by the toolkit program netstat?

    A. Port 23

    B. Port 15

    C. Port 7

    D. Port 69

  • Question 32:

    Which of the following attacks is used to hack simple alphabetical passwords?

    A. Dictionary-based attack

    B. Sniffing

    C. Man-in-the-middle attack

    D. Black hat attack

  • Question 33:

    Which of the following is NOT the primary type of firewall?

    A. Network firewall

    B. Proxy based firewall

    C. Stateful inspection firewall

    D. Packet filter firewall

  • Question 34:

    Which of the following firewalls depends on the three-way handshake of the TCP protocol?

    A. Stateful firewall

    B. Endian firewall

    C. Proxy-based firewall

    D. Packet filter firewall

  • Question 35:

    Which of the following commands is used to flush the destination cache for IPv6 interface?

    A. netsh interface ipv6 reset cache

    B. netsh interface ipv6 delete destinationcache

    C. netsh interface ipv6 flush destinationcache

    D. netsh interface ipv6 remove destinationcache

  • Question 36:

    What is the name of the group of blocks which contains information used by the operating system in Linux system?

    A. logblock

    B. Bootblock

    C. Superblock

    D. Systemblock

  • Question 37:

    Which of the following is NOT the functional area of a forensic laboratory?

    A. Network facilities

    B. Evidence storage

    C. Administrative area

    D. Research area

  • Question 38:

    This tool is known as __________.

    A. Kismet

    B. Absinthe

    C. NetStumbler

    D. THC-Scan

  • Question 39:

    Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats? Each correct answer represents a complete solution. Choose three.

    A. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

    B. These are the threats that originate from within the organization.

    C. These are the threats intended to flood a network with large volumes of access requests.

    D. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

  • Question 40:

    Which of the following file systems is designed by Sun Microsystems?

    A. NTFS

    B. CIFS

    C. ZFS

    D. ext2

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCIA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.