Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIA Practice Exam with Questions & Answers | Set: 3

Questions 31

Adam, a malicious hacker is running a scan. Statistics of the scan is as follows:

GCIA Question 31

Which of the following types of port scan is Adam running?

Options:
A.

XMAS scan

B.

ACK scan

C.

Idle scan

D.

FIN scan

GIAC GCIA Premium Access
Questions 32

The following output is generated by running the show ip route command:

RouterA#show ip route

< - - Output Omitted for brevity - ->

GCIA Question 32

Which next hop address will RouterA use in forwarding traffic to 10.10.100.0/24?

Options:
A.

172.18.50.1

B.

192.168.10.0

C.

172.18.1.1

D.

172.18.60.1

Questions 33

Which of the following tools implements a portable framework in tcpdump for capturing low-level network traffics in UNIX like networks?

Options:
A.

SysPcap

B.

libpcap

C.

BinPcap

D.

WinPcap

Questions 34

Which of the following is the default port for Hypertext Transfer Protocol (HTTP)?

Options:
A.

23

B.

21

C.

80

D.

25

Questions 35

What are the advantages of an application layer firewall?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

It provides detailed logging information for management purposes.

B.

It prevents most of the spoofing and DoS attacks.

C.

It monitors and filters data.

D.

It provides authentication to a device.

Questions 36

An attacker wants to launch an attack on a wired Ethernet. He wants to accomplish the following tasks:

Sniff data frames on a local area network.

Modify the network traffic.

Stop the network traffic frequently.

Which of the following techniques will the attacker use to accomplish the task?

Options:
A.

IP spoofing

B.

Eavesdropping

C.

ARP spoofing

D.

Session hijacking

Questions 37

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:
A.

Demilitarized zone (DMZ)

B.

Intrusion detection system (IDS)

C.

Firewall

D.

Packet filtering

Questions 38

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. Your manager requires you migrate the network to IPv6-enabled network without affecting any client computers. Which of the following actions will you take to accomplish the task?

Options:
A.

Configure stub zone on the DNS servers in the network.

B.

Configure GlobalNames zones on the DNS servers in the network.

C.

Install a new Windows Server 2003 DNS server computer on each domain and configure GlobalNames zones.

D.

Configure the client computers to use WINS.

Questions 39

Which of the following statements are true about routers?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Routers do not limit physical broadcast traffic.

B.

Routers organize addresses into classes, which are used to determine how to move packets from one network to another.

C.

Routers act as protocol translators and bind dissimilar networks.

D.

Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.

Questions 40

Which of the following is the default port for Simple Network Management Protocol (SNMP)?

Options:
A.

TCP port 110

B.

TCP port 25

C.

TCP port 80

D.

UDP port 161

Questions 41

Which of the following utilities produces the output displayed in the image below?

GCIA Question 41

Options:
A.

IPCONFIG

B.

TRACERT

C.

PING

D.

PATHPING

Questions 42

Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers. Which of the following programs can Mark use to fulfill this requirement?

Options:
A.

Microsoft Internet Security & Acceleration Server (ISA)

B.

Wingate

C.

Sniffer

D.

SOCKS

Questions 43

At which layers of the OSI and TCP/IP models does IP addressing function?

Options:
A.

OSI Layer 5 and TCP/IP Transport Layer

B.

OSI Layer 2 and TCP/IP Network Layer

C.

OSI Layer 4 and TCP/IP Application Layer

D.

OSI Layer 3 and TCP/IP Internet Layer

Questions 44

Which of the following is the default port for File Transport Protocol (FTP)?

Options:
A.

21

B.

25

C.

23

D.

80

Questions 45

Which of the following statements about User Datagram Protocol (UDP) is true?

Options:
A.

It is a hardware protocol.

B.

It is a connectionless protocol.

C.

It is a tunneling protocol.

D.

It is a connection-oriented protocol.

Exam Code: GCIA
Certification Provider: GIAC
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Sep 12, 2025
Questions: 508