Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIA Practice Exam with Questions & Answers | Set: 9

Questions 121

Which of the following hacking tools provides shell access over ICMP?

Options:
A.

John the Ripper

B.

Loki

C.

Nessus

D.

Nmap

GIAC GCIA Premium Access
Questions 122

Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?

Options:
A.

Ntoskrnl.exe

B.

Advapi32.dll

C.

Kernel32.dll

D.

Win32k.sys

Questions 123

Which of the following types of Intrusion detection systems (IDS) is used for port mirroring?

Options:
A.

Port address-based IDS

B.

Network-based IDS (NIDS)

C.

Host-based IDS (HIDS)

D.

Anomaly-based IDS

Questions 124

Which of the following is a checksum algorithm?

Options:
A.

Dsniff

B.

Adler-32

C.

Hash buster

D.

Snort

Questions 125

Which of the following can be applied as countermeasures against DDoS attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Limiting the amount of network bandwidth

B.

Blocking IP address

C.

Using LM hashes for passwords

D.

Using Intrusion detection systems

E.

Using the network-ingress filtering

Questions 126

Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?

Options:
A.

Asterisk Logger

B.

Access PassView

C.

Mail Pass View

D.

MessenPass

Questions 127

Which of the following methods is a behavior-based IDS detection method?

Options:
A.

Knowledge-based detection

B.

Protocol detection

C.

Statistical anomaly detection

D.

Pattern matching detection

Questions 128

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used.

He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about programs like Hping2 that can get into a network through covert channels.

Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?

Options:
A.

Block ICMP type 13 messages

B.

Block all outgoing traffic on port 21

C.

Block all outgoing traffic on port 53

D.

Block ICMP type 3 messages

Questions 129

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Options:
A.

Command injection attack

B.

Code injection attack

C.

Cross-Site Request Forgery

D.

Cross-Site Scripting attack

Questions 130

Which of the following is NOT an Intrusion Detection System?

Options:
A.

Fragroute

B.

Stunnel

C.

Samhain

D.

AIDE

Questions 131

Which of the following commands is used to flush the destination cache for IPv6 interface?

Options:
A.

netsh interface ipv6 reset cache

B.

netsh interface ipv6 delete destinationcache

C.

netsh interface ipv6 flush destinationcache

D.

netsh interface ipv6 remove destinationcache

Questions 132

Which of the following is the process of categorizing attack alerts produced from IDS?

Options:
A.

Site policy implementation

B.

Blocking

C.

Intrusion classify

D.

Alarm filtering

Questions 133

Routers work at which layer of the OSI reference model?

Options:
A.

Transport

B.

Physical

C.

Presentation

D.

Network

Questions 134

What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

Options:
A.

Stoner

B.

Code Red

C.

Brain

D.

Sircam

Questions 135

Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc.

Which of the following types of Cross-Site Scripting attack Ryan intends to do?

Options:
A.

Document Object Model (DOM)

B.

Non persistent

C.

SAX

D.

Persistent

Exam Code: GCIA
Certification Provider: GIAC
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Sep 12, 2025
Questions: 508