Which of the following TCP/UDP port is used by the toolkit program netstat?
A. Port 23
B. Port 15
C. Port 7
D. Port 69
Which of the following attacks is used to hack simple alphabetical passwords?
A. Dictionary-based attack
B. Sniffing
C. Man-in-the-middle attack
D. Black hat attack
Which of the following is NOT the primary type of firewall?
A. Network firewall
B. Proxy based firewall
C. Stateful inspection firewall
D. Packet filter firewall
Which of the following firewalls depends on the three-way handshake of the TCP protocol?
A. Stateful firewall
B. Endian firewall
C. Proxy-based firewall
D. Packet filter firewall
Which of the following commands is used to flush the destination cache for IPv6 interface?
A. netsh interface ipv6 reset cache
B. netsh interface ipv6 delete destinationcache
C. netsh interface ipv6 flush destinationcache
D. netsh interface ipv6 remove destinationcache
What is the name of the group of blocks which contains information used by the operating system in Linux system?
A. logblock
B. Bootblock
C. Superblock
D. Systemblock
Which of the following is NOT the functional area of a forensic laboratory?
A. Network facilities
B. Evidence storage
C. Administrative area
D. Research area
This tool is known as __________.
A. Kismet
B. Absinthe
C. NetStumbler
D. THC-Scan
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats? Each correct answer represents a complete solution. Choose three.
A. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.
B. These are the threats that originate from within the organization.
C. These are the threats intended to flood a network with large volumes of access requests.
D. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.
Which of the following file systems is designed by Sun Microsystems?
A. NTFS
B. CIFS
C. ZFS
D. ext2
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCIA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.