[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 171-180

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 171 – (Topic 2)

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6?

Each correct answer represents a complete solution. Choose all that apply.

  1. Unicast

  2. Multicast

  3. Broadcast

  4. Anycast

Answer: A,B,D

Question No: 172 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

  1. Insertion attack

  2. Session splicing attack

  3. Evasion attack

  4. Polymorphic shell code attack

Answer: D

Question No: 173 – (Topic 2)

Which of the following is the correct order of loading system files into the main memory of the system, when the computer is running on Microsoft#39;s Windows XP operating system?

  1. NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe

  2. BOOT.ini, HAL.dll, NTDETECT.com, NTLDR, NTOSKRNL.exe

  3. NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe

  4. NTLDR, BOOT.ini, NTDETECT.com, HAL.dll, NTOSKRNL.exe

Answer: D

Question No: 174 – (Topic 2)

By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?

Each correct answer represents a complete solution. Choose all that apply.

  1. By launching Sequence attack

  2. Route table poisoning

  3. By launching Social Engineering attack

  4. By launching Max Age attack

Answer: A,B,D

Question No: 175 – (Topic 2)

Which of the following is a valid IP address for class B Networks?

A. 225.128.98.7

B. 80.33.5.7

C. 212.136.45.8

D. 172.157.88.3

Answer: D

Question No: 176 – (Topic 2)

Trinity wants to send an email to her friend. She uses the MD5 generator to calculate cryptographic hash of her email to ensure the security and integrity of the email. MD5 generator, which Trinity is using operates in two steps:

Creates check file Verifies the check file

Which of the following MD5 generators is Trinity using?

  1. Secure Hash Signature Generator

  2. Mat-MD5

  3. Chaos MD5

  4. MD5 Checksum Verifier

Answer: D

Question No: 177 – (Topic 2)

Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email

detection.

Which of the following protocols does the DCC use?

  1. TCP

  2. TELNET

  3. ICMP

  4. UDP

Answer: D

Question No: 178 – (Topic 2)

Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?

  1. Caching proxy server

  2. Web proxy server

  3. Forced proxy server

  4. Open proxy server

Answer: C

Question No: 179 – (Topic 2)

You work as a Network Administrator for SmartCert Inc. The company#39;s network contains five Windows 2003 servers and ninety Windows XP Professional client computers. You want to view all the incoming requests to an Internet Information Services (IIS) server and allow only requests that comply with a rule set, created by you, to be processed. You also want to detect the intrusion attempts by recognizing the strange characters in a URL on a Web server. What will you do to accomplish the task?

  1. Use the Remote Desktop Protocol (RDP).

  2. Use the HFNETCHK utility.

  3. Use the URLScan tool.

  4. Configure a connection to the SQL database by using the RELOG command-line utility.

Answer: C

Question No: 180 – (Topic 2)

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes.

On the basis of above information, which of the following types of attack is Adam attempting to perform?

  1. Fraggle attack

  2. SYN Flood attack

  3. Land attack

  4. Ping of death attack

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.