Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIA Practice Exam with Questions & Answers | Set: 10

Questions 136

For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

DNS

B.

HTTP/HTTPS

C.

DHCP

D.

NTP

GIAC GCIA Premium Access
Questions 137

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate the DoS attack on a computer network of SecureEnet Inc. Which of the following methods will you perform to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Look for core files or crash dumps on the affected systems.

B.

Sniff network traffic to the failing machine.

C.

Seize all computers and transfer them to the Forensic lab.

D.

Look for unusual traffic on Internet connections and network segments.

Questions 138

Which of the following is known as a message digest?

Options:
A.

Hash function

B.

Hashing algorithm

C.

Spider

D.

Message authentication code

Questions 139

Fill in the blank with the appropriate facts regarding IP version 6 (IPv6).

IP addressing version 6 uses_____ -bit address. Its____ IP address assigned to a single host allows the host to send and receive data.

Options:
A.

IP addressing version 6 uses 128 -bit address. Its unicast IP address assigned to a single host allows the host to send and receive data.

Questions 140

Which of the following log files are used to collect evidences before taking the bit-stream image of the BlackBerry?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

user history

B.

Transmit/Receive

C.

Radio status

D.

Roam and Radio

Questions 141

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses. Which of the following worms has attacked the computer?

Options:
A.

Ramen

B.

LoveLetter

C.

Code red

D.

Nimda

Questions 142

You are concerned about outside attackers penetrating your network via your company Web server. You wish to place your Web server between two firewalls. One firewall between the Web server and the outside world. The other between the Web server and your network. What is this called?

Options:
A.

DMZ

B.

SPI firewall

C.

IDS

D.

Application Gateway firewall

Questions 143

Which of the following proxy servers is also referred to as transparent proxies or forced proxies?

Options:
A.

Tunneling proxy server

B.

Reverse proxy server

C.

Anonymous proxy server

D.

Intercepting proxy server

Questions 144

Which of the following techniques is used to identify attacks originating from a botnet?

Options:
A.

IFilter

B.

BPF-based filter

C.

Passive OS fingerprinting

D.

Recipient filtering

Questions 145

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:
A.

IPTables

B.

OpenSSH

C.

IPChains

D.

Stunnel

Questions 146

You work as a System Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. Your network is configured for IPv6 IP addressing. Which of the following commands will you use to test TCP/IP connectivity?

Options:
A.

ping6

B.

ifconfig

C.

traceroute

D.

ping

Questions 147

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

Options:
A.

Dsniff

B.

Snort

C.

Nikto

D.

Sniffer

Questions 148

Which of the following standard file formats is used by Apple's iPod to store contact information?

Options:
A.

HFS+

B.

vCard

C.

FAT32

D.

hCard

Questions 149

Which of the following commands displays the IPX routing table entries?

Options:
A.

sh ipx traffic

B.

sh ipx route

C.

sh ipx int e0

D.

sho ipx servers

Questions 150

Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot. Andrew wants to check the booting process. He suspects that an error persists in the bootloader of Mac OS X. Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?

Options:
A.

LILO

B.

BootX

C.

NT Loader

D.

GRUB

Exam Code: GCIA
Certification Provider: GIAC
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Sep 12, 2025
Questions: 508