[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 221-230

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 221 – (Topic 2)

Which of the following programs is used to add words to spam e-mails so that the e-mail is not considered spam and therefore is delivered as if it were a normal message?

  1. Adler-32

  2. Hash filtrer

  3. Hash buster

  4. Checksum

Answer: C

Question No: 222 – (Topic 2)

Which of the following is a valid IPv6 address?

A. 45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE B. 45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE C. 123.111.243.123

D. 45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

Answer: D

Question No: 223 – (Topic 2)

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate computer of an unfaithful employee of SecureEnet Inc.

Suspect#39;s computer runs on Windows operating system. Which of the following sources will Adam investigate on a Windows host to collect the electronic evidences?

Each correct answer represents a complete solution. Choose all that apply.

  1. Allocated cluster

  2. Swap files

  3. Slack spaces

  4. Unused and hidden partition

Answer: B,C,D

Question No: 224 – (Topic 2)

You are responsible for security at a company that specializes in e-commerce. You realize that given the high volume of Web traffic, there is a significant chance of someone being able to breach your perimeter. You want to make sure that should this occur, you can redirect the attacker away from sensitive data. How would you best accomplish this?

  1. Implement a passive IDS

  2. Implement a honey pot.

  3. Implement a stateful packet inspection firewall.

  4. Implement a network based IDS.

Answer: B

Question No: 225 – (Topic 2)

Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?

Each correct answer represents a complete solution. Choose two.

  1. SYN flood attack

  2. Teardrop attack

  3. Land attack

  4. Ping of Death attack

Answer: B,D

Question No: 226 – (Topic 2)

What are the advantages of stateless autoconfigration in IPv6? Each correct answer represents a part of the solution. Choose three.

  1. Ease of use.

  2. It provides basic authentication to determine which systems can receive configuration data

  3. No server is needed for stateless autoconfigration.

  4. No host configuration is necessary.

Answer: A,C,D

Question No: 227 – (Topic 2)

What are the advantages of an application layer firewall?

Each correct answer represents a complete solution. Choose all that apply.

  1. It provides detailed logging information for management purposes.

  2. It prevents most of the spoofing and DoS attacks.

  3. It monitors and filters data.

  4. It provides authentication to a device.

Answer: A,B,C

Question No: 228 – (Topic 2)

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of

the following disk spaces will he use to store this secret information?

Each correct answer represents a complete solution. Choose all that apply.

  1. Slack space

  2. Dumb space

  3. Hidden partition

  4. Unused Sectors

Answer: A,C,D

Question No: 229 – (Topic 2)

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system. Which of the following files will Adam investigate to accomplish the task?

  1. /boot/grub/menu.lst

  2. /grub/grub.com

  3. /boot/boot.conf

  4. /boot/grub/grub.conf

Answer: A

Question No: 230 – (Topic 2)

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network.

A branch office is connected to the headquarters through a T1 line. Users at the branch office report poor voice quality on the IP phone while communicating with the headquarters. You find that an application, named WorkReport, at the branch office is suffocating bandwidth by sending large packets for file synchronization. You need to improve the voice quality on the IP phone. Which of the following steps will you choose to accomplish this?

  1. Configure traffic shaping to increase the time interval for the WorkReport packets.

  2. Configure traffic shaping to increase the time interval for the IP phone packets.

  3. Configure traffic shaping to reduce bandwidth for the IP phone.

  4. Configure traffic shaping to reduce bandwidth for WorkReport.

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.