[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 181-190

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 181 – (Topic 2)

You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company#39;s Website. Which of the following methods of investigation can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.

  2. Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company#39;s site.

  3. Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.

  4. Look at the Web servers logs and normal traffic logging.

Answer: A,B,D

Question No: 182 – (Topic 2)

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate Plagiarism occurred in the source code files of C#. Which of the following tools will you use to detect the software plagiarism?

  1. VAST

  2. Jplag

  3. SCAM

  4. Turnitin

Answer: B

Question No: 183 – (Topic 2)

Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a remote location and a public IPv4 address, instead of public IPv6 address, has been assigned to the computer?

  1. ISATAP

  2. PortProxy

  3. 6to4

  4. Teredo

Answer: C

Question No: 184 – (Topic 2)

Maria works as the Chief Security Officer for passguide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides #39;security through obscurity#39;. What technique is Maria using?

  1. Encryption

  2. Public-key cryptography

  3. Steganography

  4. RSA algorithm

Answer: C

Question No: 185 – (Topic 2)

Which of the following is allowed by a company to be addressed directly from the public network and is hardened to screen the rest of its network from security exposure?

  1. Intrusion detection system

  2. A computer installed in the network and configured with sender reputation

  3. bastion host

  4. Exchange ActiveSync

Answer: C

Question No: 186 – (Topic 2)

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP#39;s DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command.

Which of the following commands will you use?

  1. ping -a

  2. ping -l

  3. ping -t

  4. ping -n

Answer: C

Question No: 187 – (Topic 2)

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

  1. Frequency

  2. Delay

  3. Load

  4. Bandwidth

Answer: A

Question No: 188 – (Topic 2)

What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?

  1. Use the TRACERT command with the /pingname parameter.

  2. Ping the source host with its computer name.

  3. Ping the source host with its IP address.

  4. Check the IP statistics on the file server.

Answer: B

Question No: 189 – (Topic 2)

Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

  1. Netresident

  2. Snort

  3. Wireshark

  4. NetWitness

Answer: C

Question No: 190 – (Topic 2)

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

  1. Stateful firewall

  2. Proxy-based firewall

  3. Packet filter firewall

  4. Endian firewall

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.