Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIA Practice Exam with Questions & Answers | Set: 8

Questions 106

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

Options:
A.

The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enabled.

B.

The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.

C.

The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enabled.

D.

The Enable Intrusion detection check box on the General tab page of the IP Packet Filters

Properties dialog box is not selected.

GIAC GCIA Premium Access
Questions 107

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

Options:
A.

These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

B.

These are the threats that originate from within the organization.

C.

These are the threats intended to flood a network with large volumes of access requests.

D.

These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

Questions 108

Which of the following wireless network standards operates on the 5 GHz band and transfers data at a rate of 54 Mbps?

Options:
A.

802.11g

B.

802.11a

C.

802.11u

D.

802.11b

Questions 109

Which of the following firewalls depends on the three-way handshake of the TCP protocol?

Options:
A.

Stateful firewall

B.

Endian firewall

C.

Proxy-based firewall

D.

Packet filter firewall

Questions 110

Which of the following tools are used to determine the hop counts of an IP packet?

Each correct answer represents a complete solution. Choose two.

Options:
A.

TRACERT

B.

Ping

C.

IPCONFIG

D.

Netstat

Questions 111

Which of the following commands is a Packet sniffer?

Options:
A.

tcpdump

B.

strace

C.

nmap

D.

tail

Questions 112

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

Options:
A.

FAU

B.

FTK Imager

C.

Galleta

D.

Device Seizure

Questions 113

Which of the following parts of hard disk in Mac OS X File system stores information related to the files?

Options:
A.

Resource fork

B.

Data fork

C.

System fork

D.

Log fork

Questions 114

Which of the following attacks is designed to deduce the brand and/or version of an operating system or application?

Options:
A.

Vulnerability assessment

B.

Banner grabbing

C.

OS fingerprinting

D.

Port scanning

Questions 115

Which of the following file systems is designed by Sun Microsystems?

Options:
A.

NTFS

B.

CIFS

C.

ZFS

D.

ext2

Questions 116

You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

Options:
A.

Site-local

B.

Global unicast

C.

Local-link

D.

Loopback

Questions 117

In which of the following attacks does a hacker imitate a DNS server and obtain the entire DNS database?

Options:
A.

Illicit zone transfer attack

B.

DNS poisoning attack

C.

Illicit poisoning attack

D.

DNS transfer attack

Questions 118

Which of the following types of attacks uses ICMP to consume bandwidth and crash sites?

Options:
A.

MITM attack

B.

SYN flood attack

C.

TFN attack

D.

XSS attack

Questions 119

Which of the following is NOT the primary type of firewall?

Options:
A.

Network firewall

B.

Proxy based firewall

C.

Stateful inspection firewall

D.

Packet filter firewall

Questions 120

Which of the following partitions contains the system files that are used to start the operating system?

Options:
A.

Secondary partition

B.

Boot partition

C.

Primary partition

D.

System partition

Exam Code: GCIA
Certification Provider: GIAC
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Sep 12, 2025
Questions: 508