Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIA Practice Exam with Questions & Answers | Set: 2

Questions 16

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:
A.

Stateful firewall

B.

Proxy-based firewall

C.

Packet filter firewall

D.

Endian firewall

GIAC GCIA Premium Access
Questions 17

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.

The tool uses raw IP packets to determine the following:

What ports are open on our network systems.

What hosts are available on the network.

Identify unauthorized wireless access points.

What services (application name and version) those hosts are offering.

What operating systems (and OS versions) they are running.

What type of packet filters/firewalls are in use.

Which of the following tools is Victor using?

Options:
A.

Nessus

B.

Nmap

C.

Sniffer

D.

Kismet

Questions 18

Trinity wants to send an email to her friend. She uses the MD5 generator to calculate cryptographic hash of her email to ensure the security and integrity of the email. MD5 generator, which Trinity is using operates in two steps:

Creates check file

Verifies the check file

Which of the following MD5 generators is Trinity using?

Options:
A.

Secure Hash Signature Generator

B.

Mat-MD5

C.

Chaos MD5

D.

MD5 Checksum Verifier

Questions 19

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:
A.

Signature-based

B.

Network-based

C.

File-based

D.

Anomaly-based

Questions 20

What are the advantages of stateless autoconfigration in IPv6?

Each correct answer represents a part of the solution. Choose three.

Options:
A.

Ease of use.

B.

It provides basic authentication to determine which systems can receive configuration data

C.

No server is needed for stateless autoconfigration.

D.

No host configuration is necessary.

Questions 21

Which of the following is a valid IPv6 address?

Options:
A.

45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE

B.

45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE

C.

123.111.243.123

D.

45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

Questions 22

Adam works on a Linux system. He is using Sendmail as the primary application to transmit e-mails.

Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

Options:
A.

/log/var/mailog

B.

/var/log/logmail

C.

/var/log/mailog

D.

/log/var/logd

Questions 23

Which of the following is the default port used by Simple Mail Transfer Protocol (SMTP)?

Options:
A.

80

B.

25

C.

20

D.

21

Questions 24

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:
A.

IPCONFIG

B.

PING

C.

TRACERT

D.

NSLOOKUP

Questions 25

Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?

Options:
A.

Display memory error

B.

Cache memory test failed

C.

Processor failure

D.

Mother board timer not operational

Questions 26

You are responsible for security at a company that specializes in e-commerce. You realize that given the high volume of Web traffic, there is a significant chance of someone being able to breach your perimeter. You want to make sure that should this occur, you can redirect the attacker away from sensitive data. How would you best accomplish this?

Options:
A.

Implement a passive IDS

B.

Implement a honey pot.

C.

Implement a stateful packet inspection firewall.

D.

Implement a network based IDS.

Questions 27

Which of the following is the default port for POP3?

Options:
A.

21

B.

110

C.

80

D.

25

Questions 28

Which of the following is a reason to implement security logging on a DNS server?

Options:
A.

For recording the number of queries resolved

B.

For preventing malware attacks on a DNS server

C.

For measuring a DNS server's performance

D.

For monitoring unauthorized zone transfer

Questions 29

Which of the following Linux file systems is a journaled file system?

Options:
A.

ext3

B.

ext4

C.

ext2

D.

ext

Questions 30

Andrew works as an Administrator for a Windows 2000 based network. The network has a primary external DNS server, and a secondary DNS server located on the ISP's UNIX server, in order to provide fault tolerance. Users complain that they are unable to connect to the URL when using the secondary server. What should Andrew do to resolve the problem?

Options:
A.

He should disable the fast zone transfer in the Advanced tab of the Properties window on the secondary server.

B.

He should select the BIND secondaries check box in the Zone Transfer tab of the Properties window on the primary server.

C.

He should select the BIND secondaries check box in the Advanced tab of the Properties window on the primary server.

D.

He should enable the fast zone transfer in the Advanced tab of the Properties window on the primary server.

Exam Code: GCIA
Certification Provider: GIAC
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Sep 12, 2025
Questions: 508