[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 151-160

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 151 – (Topic 2)

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network. You want to know the current TCP/IP network configuration settings, DHCP server IP address, and DHCP lease expiration date of your network.

Which of the following utilities will you use?

  1. PING

  2. TELNET

  3. TRACERT

  4. IPCONFIG

Answer: D

Question No: 152 – (Topic 2)

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The network is configured on IP version 6 protocol. All the computers on the network are connected to a switch device. One day, users complain that they are unable to connect to a file server. You try to ping the client computers from the server, but the pinging fails. You try to ping the server#39;s own loopback address, but it fails to ping. You restart the server, but the problem persists.

What is the most likely cause?

  1. The switch device is not working.

  2. The cable that connects the server to the switch is broken.

  3. Automatic IP addressing is not working.

  4. The server#39;s NIC is not working.

  5. The server is configured with unspecified IP address.

Answer: D

Question No: 153 – (Topic 2)

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

  1. Rainbow attack

  2. DoS attack

  3. ARP spoofing

  4. Replay attack

Answer: B

Question No: 154 – (Topic 2)

John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company#39;s phone bill has increased drastically. John suspects that the company#39;s phone system has been cracked by a malicious hacker.

Which attack is used by malicious hackers to crack the phone system?

  1. War dialing

  2. Sequence attack

  3. Phreaking

  4. Man-in-the-middle attack

Answer: C

Question No: 155 – (Topic 2)

You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline. This type of IDS is called .

  1. Anomaly Based

  2. Reactive IDS

  3. Passive IDS

  4. Signature Based

Answer: A

Question No: 156 – (Topic 2)

Which of the following is the default port for POP3?

A. 21

B. 110

  1. 80

  2. 25

Answer: B

Question No: 157 – (Topic 2)

You work as a network administrator for BlueWell Inc. You have to convert your 48-bit host address (MAC address) to an IPv6 54-bit address. Using the IEEE-EUI-64 conversion process, how do you convert the 48-bit host address (MAC address) to an IPv6 54-bit address?

  1. Add EF. FE between the third and fourth bytes.

  2. Add FE. EE between the third and fourth bytes.

  3. Add FF. EE between the third and fourth bytes.

  4. Add FF. FE between the third and fourth bytes

Answer: D

Question No: 158 – (Topic 2)

Which of the following units of data does the data-link layer send from the network layer to the physical layer of the OSI model?

  1. Protocols

  2. Raw bits

  3. Data packets

  4. Data frames

  5. Data segments

Answer: D

Question No: 159 – (Topic 2)

The following output is generated by running the show ip route command:

RouterA#show ip route

lt; – – Output Omitted for brevity – -gt;

Ensurepass 2017 PDF and VCE

Which next hop address will RouterA use in forwarding traffic to 10.10.100.0/24?

A. 172.18.50.1

B. 192.168.10.0

C. 172.18.1.1

D. 172.18.60.1

Answer: C

Question No: 160 – (Topic 2)

Which of the following types of firewall ensures that the packets are part of the established session?

  1. Switch-level firewall

  2. Application-level firewall

  3. Stateful inspection firewall

  4. Circuit-level firewall

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.