[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 201-210

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!

Topic 1, Volume A

Question No: 201 – (Topic 2)

An attacker wants to launch an attack on a wired Ethernet. He wants to accomplish the following tasks:

Sniff data frames on a local area network. Modify the network traffic.

Stop the network traffic frequently.

Which of the following techniques will the attacker use to accomplish the task?

  1. IP spoofing

  2. Eavesdropping

  3. ARP spoofing

  4. Session hijacking

Answer: C

Question No: 202 – (Topic 2)

Which of the following utilities produces the output shown in the image below?

Ensurepass 2017 PDF and VCE


  2. PING



Answer: B

Question No: 203 – (Topic 2)

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

Ensurepass 2017 PDF and VCE

Which of the following tools can be used as a countermeasure to such an attack?

  1. Obiwan

  2. SmashGuard

  3. Kismet

  4. Absinthe

Answer: B

Question No: 204 – (Topic 2)

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as .

  1. True negative

  2. True positive

  3. False negative

  4. False positive

Answer: D

Question No: 205 – (Topic 2)

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.

The tool uses raw IP packets to determine the following:

What ports are open on our network systems. What hosts are available on the network.

Identify unauthorized wireless access points.

What services (application name and version) those hosts are offering. What operating systems (and OS versions) they are running.

What type of packet filters/firewalls are in use. Which of the following tools is Victor using?

  1. Nessus

  2. Nmap

  3. Sniffer

  4. Kismet

Answer: B

Question No: 206 – (Topic 2)

Web applications are accessed by communicating over TCP ports via an IP address. Choose the two most common Web Application TCP ports and their respective protocol names.

Each correct answer represents a complete solution. Choose two.

  1. TCP Port 443 / S-HTTP or SSL

  2. TCP Port 443 / HTTPS or SSL

  3. TCP Port 80 / HTTP

  4. TCP Port 80 / HTTPS or SSL

Answer: B,C

Question No: 207 – (Topic 2)

Which of the following statements about Secure Shell (SSH) are true? Each correct answer represents a complete solution. Choose three.

  1. It is the core routing protocol of the Internet.

  2. It allows data to be exchanged using a secure channel between two networked devices.

  3. It was designed as a replacement for TELNET and other insecure shells.

  4. It is a network protocol used primarily on Linux and Unix based systems.

Answer: B,C,D

Question No: 208 – (Topic 2)

Which of the following utilities provides an efficient way to give specific users permission to

use specific system commands at the root level of a Linux operating system?

  1. SSH

  2. SUDO

  3. Apache

  4. Snort

Answer: B

Question No: 209 – (Topic 2)

Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?

Each correct answer represents a complete solution. Choose all that apply.

  1. Close existing email account and open new email account.

  2. Forward a copy of the spam to the ISP to make the ISP conscious of the spam.

  3. Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.

  4. Send an email to the domain administrator responsible for the initiating IP address.

Answer: B,C

Question No: 210 – (Topic 2)

Which of the following protocols is used by voice over IP (VoIP) applications?

  1. UDP

  2. TCP

  3. ICMP

  4. IPv6

Answer: A

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.