Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIA Practice Exam with Questions & Answers | Set: 5

Questions 61

Which of the following commands is used to refresh the Master Boot Record (MBR) in MS-DOS?

Options:
A.

CHKDSK

B.

FDISK

C.

XDISK

D.

FORMAT

GIAC GCIA Premium Access
Questions 62

Which of the following wireless security features provides the best wireless security mechanism?

Options:
A.

WPA

B.

WPA with Pre Shared Key

C.

WPA with 802.1X authentication

D.

WEP

Questions 63

Which of the following sectors on a hard disk contains codes that the computer uses to start the system?

Options:
A.

Sector 256

B.

Sector 0

C.

Sector 1

D.

Sector 128

Questions 64

Which of the following files records all driver installations after the system has booted?

Options:
A.

setupapi.com

B.

recdriver.log

C.

drivinst.log

D.

setupapi.log

Questions 65

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

Options:
A.

Neighbor Solicitation

B.

Router Solicitation

C.

Neighbor Advertisement

D.

Router Advertisement

Questions 66

Which of the following is an example of a firewall?

Options:
A.

ZoneAlarm

B.

PatriotBox

C.

Specter

D.

KFSensor

Questions 67

Which of the following image file formats uses a lossy data compression technique?

Options:
A.

GIF

B.

JPG

C.

PNG

D.

TIF

Questions 68

Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

Options:
A.

Logical Link control and Media Access control

B.

Logical control and Link control

C.

Machine Link control and Logical Link control

D.

Data control and Media Access control

Questions 69

What is the function of PING LOCALHOST command?

Options:
A.

It verifies that DNS is correctly set up to allow communication with a host, named LOCALHO ST.

B.

It verifies that TCP/IP is bound correctly to the network adapter by communicating with the domain controller.

C.

It verifies that TCP/IP is bound correctly to the network adapter by communicating with the successfully initialized IP address.

D.

It verifies that TCP/IP is bound correctly to the network adapter by communicating with the loopback address 127.0.0.1.

Questions 70

Which of the following ICMP types refers to the message "Time Exceeded"?

Options:
A.

Type 4

B.

Type 12

C.

Type 11

D.

Type 5

Questions 71

Which system is designed to analyze, detect, and report on security-related events?

Options:
A.

NIPS

B.

HIPS

C.

NIDS

D.

HIDS

Questions 72

Which of the following attacks is based on the concept that IDSs cannot recognize Unicode encoded malicious data?

Options:
A.

DoS attack

B.

Fragmentation overlap attack

C.

Obfuscating attack payload

D.

Polymorphic shell code attack

Questions 73

Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?

Options:
A.

Cache memory test failed

B.

Mother board timer not operational

C.

Display memory error

D.

Processor failure

Questions 74

Which of the following is computed from an arbitrary block of digital data for the purpose of detecting accidental errors?

Options:
A.

Hash buster

B.

Firewall

C.

Checksum

D.

Hash filter

Questions 75

Which of the following utilities is used for decrypting WEP encryption on an 802.11b network?

Options:
A.

Wireshark

B.

NetStumbler

C.

Airsnort

D.

Kismet

Exam Code: GCIA
Certification Provider: GIAC
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Sep 12, 2025
Questions: 508