[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 111-120

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 111 – (Topic 1)

Which of the following command-line utilities is used to show the state of current TCP/IP

connections?

  1. PING

  2. TRACERT

  3. NETSTAT

  4. NSLOOKUP

Answer: C

Question No: 112 – (Topic 1)

Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers. Which of the following programs can Mark use to fulfill this requirement?

  1. Microsoft Internet Security amp; Acceleration Server (ISA)

  2. Wingate

  3. Sniffer

  4. SOCKS

Answer: B

Question No: 113 – (Topic 1)

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication

information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

  1. Dsniff

  2. Libnids

  3. Cain

  4. LIDS

Answer: A

Question No: 114 – (Topic 1)

Adam works as a professional Computer Hacking Forensic Investigator. He has been called by the FBI to examine data of the hard disk, which is seized from the house of a suspected terrorist.

Adam decided to acquire an image of the suspected hard drive. He uses a forensic hardware tool, which is capable of capturing data from IDE, Serial ATA, SCSI devices, and flash cards. This tool can also produce MD5 and CRC32 hash while capturing the data.

Which of the following tools is Adam using?

  1. ImageMASSter Solo-3

  2. ImageMASSter 4002i

  3. FireWire DriveDock

  4. Wipe MASSter

Answer: A

Question No: 115 – (Topic 1)

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

  1. libpcap

  2. WinPCap

  3. PCAP

  4. SysPCap

Answer: B

Question No: 116 – (Topic 1)

Which of the following file systems supports the hot fixing feature?

  1. FAT16

  2. exFAT

  3. NTFS

  4. FAT32

Answer: C

Question No: 117 – (Topic 1)

In which of the following IKE phases the IPsec endpoints establish parameters for a secure ISAKMP session?

  1. IKE Phase 2.5

  2. IKE Phase 2

  3. IKE Phase 1

  4. IKE Phase 1.5

Answer: C

Question No: 118 – (Topic 1)

Which of the following are default ports for the FTP service?

Each correct answer represents a complete solution. Choose two.

  1. 80

  2. 21

  3. 20

D. 443

Answer: B,C

Question No: 119 – (Topic 1)

You work as a Network Administrator for TechPerfect Inc. The company has a corporate intranet setup. A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork. Which of the following steps will you take to accomplish the task?

  1. Block the ICMP protocol through ACL.

  2. Block the IPv6 protocol through ACL.

  3. Block the UDP protocol through ACL.

  4. Block the TCP protocol through ACL.

Answer: A

Question No: 120 – (Topic 1)

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux- based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses. Which of the following worms has attacked the computer?

  1. Ramen

  2. LoveLetter

  3. Code red

  4. Nimda

Answer: A

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.