[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 121-130

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 121 – (Topic 1)

Which of the following work as traffic monitoring tools in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

  1. MRTG

  2. John the Ripper

  3. IPTraf

  4. Ntop

Answer: A,C,D

Question No: 122 – (Topic 1)

Which of the following is the default port for DNS zone transfer?

  1. Port 21

  2. Port 80

  3. Port 23

  4. Port 53

Answer: D

Question No: 123 – (Topic 1)

For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.

Each correct answer represents a complete solution. Choose all that apply.

  1. DNS

  2. HTTP/HTTPS

  3. DHCP

  4. NTP

Answer: A,B,C

Question No: 124 – (Topic 1)

Which of the following statements about User Datagram Protocol (UDP) is true?

  1. It is a hardware protocol.

  2. It is a connectionless protocol.

  3. It is a tunneling protocol.

  4. It is a connection-oriented protocol.

Answer: B

Question No: 125 – (Topic 1)

The promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it.

Which of the following tools works by placing the host system network card into the promiscuous mode?

  1. NetStumbler

  2. Snort

  3. THC-Scan

  4. Sniffer

Answer: D

Question No: 126 – (Topic 1)

At which layers of the OSI and TCP/IP models does IP addressing function?

  1. OSI Layer 5 and TCP/IP Transport Layer

  2. OSI Layer 2 and TCP/IP Network Layer

  3. OSI Layer 4 and TCP/IP Application Layer

  4. OSI Layer 3 and TCP/IP Internet Layer

Answer: D

Question No: 127 – (Topic 1)

Which of the following firewalls keeps track of the state of network connections traveling

across the network?

  1. Stateful firewall

  2. Application-level firewall

  3. Packet filtering firewall

  4. Circuit-level firewall

Answer: A

Question No: 128 – (Topic 1)

Nathan works as a Computer Hacking Forensic Investigator for SecureEnet Inc. He uses Visual TimeAnalyzer software to track all computer usage by logging into individual users account or specific projects and compile detailed accounts of time spent within each program. Which of the following functions are NOT performed by Visual TimeAnalyzer?

Each correct answer represents a complete solution. Choose all that apply.

  1. It monitors all user data such as passwords and personal documents.

  2. It gives parents control over their children#39;s use of the personal computer.

  3. It tracks work time, pauses, projects, costs, software, and internet usage.

  4. It records specific keystrokes and run screen captures as a background process.

Answer: A,D

Question No: 129 – (Topic 1)

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic project. Now, you want to know the IP address of the sender so that you can analyze various information such as the actual location, domain information, operating system being used, contact information, etc. of the email sender with the help of various tools and resources. You also want to check whether this email is fake or real. You know that analysis of email headers is a good starting point in such cases. The email header of the suspicious email is given below:

Ensurepass 2017 PDF and VCE

What is the IP address of the sender of this email?

A. 216.168.54.25

B. 141.1.1.1

C. 172.16.10.90

D. 209.191.91.180

Answer: A

Question No: 130 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has written the following snort signature:

Ensurepass 2017 PDF and VCE

Which of the following statements about this snort signature is true?

  1. It detects the session splicing IDS evasion attack.

  2. It detects AOL IM chat.

  3. It detects Yahoo IM chat.

  4. It detects the bad file attachments coming to the mail server.

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.