[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 11-20

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 11 – (Topic 1)

Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Checkpoint files

  2. EDB and STM database files

  3. Temporary files

  4. cookie files

Answer: A,B,C

Question No: 12 – (Topic 1)

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

->It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.

->It is commonly used for the following purposes:

  1. War driving

  2. Detecting unauthorized access points

  3. Detecting causes of interference on a WLAN

  4. WEP ICV error tracking

  5. Making Graphs and Alarms on 802.11 Data, including Signal Strength

Answer: D

Question No: 13 – (Topic 1)

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

  1. Blowfish

  2. IDEA

  3. DES

  4. RC4

Answer: A,B,C

Question No: 14 – (Topic 1)

Adam works as a Security Analyst for Umbrella Inc. He is performing real-time traffic analysis on IP networks using Snort. Adam is facing problems in analyzing intrusion data. Which of the following software combined with Snort can Adam use to get a visual representation of intrusion data?

Each correct answer represents a complete solution. Choose all that apply.

  1. Basic Analysis and Security Engine (BASE)

  2. sguil

  3. KFSensor

  4. OSSIM

Answer: A,B,D

Question No: 15 – (Topic 1)

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

  1. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

  2. These are the threats that originate from within the organization.

  3. These are the threats intended to flood a network with large volumes of access requests.

  4. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

Answer: A,C,D

Question No: 16 – (Topic 1)

Which of the following file systems is designed by Sun Microsystems?

  1. NTFS

  2. CIFS

  3. ZFS

  4. ext2

Answer: C

Question No: 17 – (Topic 1)

You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

  1. Site-local

  2. Global unicast

  3. Local-link

  4. Loopback

Answer: B

Question No: 18 – (Topic 1)

Which of the following is the default port for Simple Network Management Protocol (SNMP)

?

  1. TCP port 110

  2. TCP port 25

  3. TCP port 80

  4. UDP port 161

Answer: D

Question No: 19 – (Topic 1)

Which of the following statements are true about snort?

Each correct answer represents a complete solution. Choose all that apply.

  1. It develops a new signature to find vulnerabilities.

  2. It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS clients.

  3. It encrypts the log file using the 256 bit AES encryption scheme algorithm.

  4. It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connections.

Answer: A,B,D

Question No: 20 – (Topic 1)

Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect#39;s computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?

  1. Asterisk Logger

  2. Access PassView

  3. Mail Pass View

  4. MessenPass

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.