[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 21-30

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 21 – (Topic 1)

Which of the following tools are used to determine the hop counts of an IP packet? Each correct answer represents a complete solution. Choose two.

  1. TRACERT

  2. Ping

  3. IPCONFIG

  4. Netstat

Answer: A,B

Question No: 22 – (Topic 1)

Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?

Each correct answer represents a complete solution. Choose all that apply.

  1. All ideas present in the investigative report should flow logically from facts to conclusions.

  2. Opinion of a lay witness should be included in the investigative report.

  3. The investigative report should be understandable by any reader.

  4. There should not be any assumptions made about any facts while writing the investigative report.

Answer: A,C,D

Question No: 23 – (Topic 1)

Which of the following can be applied as countermeasures against DDoS attacks? Each correct answer represents a complete solution. Choose all that apply.

  1. Limiting the amount of network bandwidth.

  2. Blocking IP address.

  3. Using LM hashes for passwords.

  4. Using Intrusion detection systems.

  5. Using the network-ingress filtering.

Answer: A,B,D,E

Question No: 24 – (Topic 1)

Adam works as a professional Computer Hacking Forensic Investigator. A project has been

assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

  1. FAU

  2. FTK Imager

  3. Galleta

  4. Device Seizure

Answer: D

Question No: 25 – (Topic 1)

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used.

He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about programs like Hping2 that can get into a network through covert channels.

Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?

  1. Block ICMP type 13 messages

  2. Block all outgoing traffic on port 21

  3. Block all outgoing traffic on port 53

  4. Block ICMP type 3 messages

Answer: A

Question No: 26 – (Topic 1)

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

  1. Dsniff

  2. Snort

  3. Nikto

  4. Sniffer

Answer: C

Question No: 27 – (Topic 1)

Which of the following methods is a behavior-based IDS detection method?

  1. Knowledge-based detection

  2. Protocol detection

  3. Statistical anomaly detection

  4. Pattern matching detection

Answer: C

Question No: 28 – (Topic 1)

You work as a Network Administrator for McNeil Inc. The company#39;s Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

  1. The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enabled.

  2. The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.

  3. The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enabled.

  4. The Enable Intrusion detection check box on the General tab page of the IP Packet Filters

Properties dialog box is not selected.

Answer: D

Question No: 29 – (Topic 1)

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

  1. Command injection attack

  2. Code injection attack

  3. Cross-Site Request Forgery

  4. Cross-Site Scripting attack

Answer: B

Question No: 30 – (Topic 1)

You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?

  1. PING

  2. TELNET

  3. NETSTAT

  4. TRACERT

Answer: A

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.