[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 161-170

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!

Topic 1, Volume A

Question No: 161 – (Topic 2)

Which of the following terms describes an attempt to transfer DNS zone data?

  1. Reconnaissance

  2. Encapsulation

  3. Dumpster diving

  4. Spam

Answer: A

Question No: 162 – (Topic 2)

You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You want to get the protocol statistics and the active TCP/IP network connections of your computer. Which of the following will you use?


  2. SNMP

  3. ARP



Answer: E

Question No: 163 – (Topic 2)

What are the limitations of the POP3 protocol?

Each correct answer represents a complete solution. Choose three.

  1. E-mails can be retrieved only from the Inbox folder of a mailbox. E-mails stored in any other folder are not accessible.

  2. It is only a retrieval protocol. It is designed to work with other applications that provide the ability to send e-mails.

  3. It does not support retrieval of encrypted e-mails.

  4. It uses less memory space.

Answer: A,B,C

Question No: 164 – (Topic 2)

What is the order of the extension headers that is followed by IPv6?

  1. Destination Options (first), Routing, IPv6 header, Hop-by-Hop, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

  2. Routing, Hop-by-Hop, Destination Options (first), Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

  3. Fragment, Routing, Hop-by-Hop, Destination Options (first), Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

  4. IPv6 header, Hop-by-Hop, Destination Options (first), Routing, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

Answer: D

Question No: 165 – (Topic 2)

Which of the following statements about FTP is true?

  1. It holds files transmitted through POP3 mail.

  2. It manages network devices.

  3. It connects file servers on the World Wide Web.

  4. It transfers files between computers.

  5. It allows password free file transfers.

Answer: D

Question No: 166 – (Topic 2)

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company.

Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Text Semagrams

  2. Linguistic steganography

  3. Technical steganography

  4. Perceptual masking

Answer: A,B

Question No: 167 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

  1. Hunt

  2. Alchemy Remote Executor

  3. Mendax

  4. Ettercap

Answer: C

Question No: 168 – (Topic 2)

In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?

  1. Insertion

  2. Session splicing

  3. Fragmentation overlap

  4. Fragmentation overwrite

Answer: B

Question No: 169 – (Topic 2)

Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law

firm. He is working on a case of a cyber crime. Peter knows that the good investigative report should not only communicate the relevant facts, but also present expert opinion. This report should not include the cases in which the expert acted as a lay witness. Which of the following type of witnesses is a lay witness?

  1. One who can give a firsthand account of something seen, heard, or experienced.

  2. One with special knowledge of the subject about which he or she is testifying.

  3. One who observes an event.

  4. One who is not qualified as an expert witness.

Answer: D

Question No: 170 – (Topic 2)

You work as a network administrator for Tech Perfect Inc. Rick, your assistant, requires information regarding his computer#39;s IP address lease start date and expiry date. Which of the following commands will help him?

A. Ipconfig /all

B. Ping

  1. Ping /t

  2. Ipconfig /renew

Answer: A

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.