Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIA Practice Exam with Questions & Answers | Set: 7

Questions 91

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Fragroute

B.

Ettercap

C.

Mendax

D.

Tcpdump

GIAC GCIA Premium Access
Questions 92

You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer. While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command. What is the cause of the issue?

Options:
A.

Core Networking Firewall rules do not allow IPv4 or IPv6.

B.

Windows Firewall rules do not allow Core Networking Tools.

C.

Windows Firewall blocks the command line tools.

D.

Core Networking Firewall rules do not allow ICMPv4 or ICMPv6 Echo Requests.

Questions 93

Which of the following is the ability of a hacker to determine the nature of the network?

Options:
A.

Investigating

B.

Profiling

C.

Sniffing

D.

Intruding

Questions 94

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

Options:
A.

Preparation

B.

gaining access

C.

Scanning

D.

Reconnaissance

Questions 95

Which of the following processes is used to convert plain text into cipher text?

Options:
A.

Encryption

B.

Decryption

C.

Encapsulation

D.

Steganography

Questions 96

Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

Options:
A.

Ping of Death attack

B.

DDoS attack

C.

SYN flood attack

D.

Teardrop attack

Questions 97

How many bits does IPv6 use in IP addresses?

Options:
A.

40 bits

B.

32 bits

C.

64 bits

D.

128 bits

Questions 98

Which of the following TCP/UDP port is used by the toolkit program netstat?

Options:
A.

Port 23

B.

Port 15

C.

Port 7

D.

Port 69

Questions 99

Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

Options:
A.

CHKDSK /I

B.

CHKDSK /R /F

C.

CHKDSK /C /L

D.

CHKDSK /V /X

Questions 100

Which of the following is an automated vulnerability assessment tool?

Options:
A.

Kismet

B.

Nessus

C.

Sniffer

D.

Snort

Questions 101

Which of the following is not a Denial of Service (DoS) attack?

Options:
A.

Smurf attack

B.

Code injection attack

C.

Ping of Death attack

D.

Teardrop attack

Questions 102

Which of the following is NOT the functional area of a forensic laboratory?

Options:
A.

Network facilities

B.

Evidence storage

C.

Administrative area

D.

Research area

Questions 103

Which of the following DNS resource records is used to resolve a host name to an IPv6 address?

Options:
A.

AAAA

B.

HINFO

C.

CNAME

D.

A

Questions 104

Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

Options:
A.

Data control and Media Access control

B.

Logical control and Link control

C.

Logical Link control and Media Access control

D.

Machine Link control and Logical Link control

Questions 105

Which of the following ports is used by Layer 2 Tunneling Protocol (L2TP)?

Options:
A.

UDP port 1701

B.

UDP port 67

C.

TCP port 23

D.

TCP port 25

Exam Code: GCIA
Certification Provider: GIAC
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Sep 12, 2025
Questions: 508