[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 231-240

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 231 – (Topic 2)

Andrew works as an Administrator for a Windows 2000 based network. The network has a primary external DNS server, and a secondary DNS server located on the ISP#39;s UNIX server, in order to provide fault tolerance. Users complain that they are unable to connect to the URL when using the secondary server. What should Andrew do to resolve the problem?

  1. He should disable the fast zone transfer in the Advanced tab of the Properties window on the secondary server.

  2. He should select the BIND secondaries check box in the Zone Transfer tab of the Properties window on the primary server.

  3. He should select the BIND secondaries check box in the Advanced tab of the Properties window on the primary server.

  4. He should enable the fast zone transfer in the Advanced tab of the Properties window on the primary server.

Answer: C

Question No: 232 – (Topic 2)

Adam works on a Linux system. He is using Sendmail as the primary application to transmit e-mails.

Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

  1. /log/var/mailog

  2. /var/log/logmail

  3. /var/log/mailog

  4. /log/var/logd

Answer: C

Question No: 233 – (Topic 2)

Which of the following statements are true about UDP?

Each correct answer represents a complete solution. Choose all that apply.

  1. TFTP uses a UDP port for communication.

  2. UDP is an unreliable protocol.

  3. FTP uses a UDP port for communication.

  4. UDP works at the data-link layer of the OSI model.

  5. UDP is a connectionless protocol.

Answer: A,B,E

Question No: 234 – (Topic 2)

Ben works as a Network Administrator in Business Software Solutions Ltd. The company uses a Windowsbased operating system throughout its network. Ben finds the following mail exchange record on the server:

max1.passguide.com. IN A 613.0.2.1 IN AAAA 4ffe:d00:1:1::88

Which of the following conclusions can Ben derive from this record?

  1. It indicates the configuration of the POP3 server (max1) on the site passguide.com on how to handle e-mails from the site 613.0.2.1 and an internal computer with NIC address 4ffe:d00:1:1::88.

  2. It indicates the preference of the record.

  3. It indicates the configuration of the SMTP server (max1) on the site passguide.com on how to handle e-mails from the site 613.0.2.1 and an internal computer with NIC address 4ffe:d00:1:1::88.

  4. It indicates part of the DNS configuration for the primary server to handle both IPV4 and IPV6 requests.

Answer: D

Question No: 235 – (Topic 2)

Which of the following IPv4 to IPv6 transition methods uses encapsulation of IPv6 packets to traverse IPv4 networks?

  1. Dual-stack

  2. Translation

  3. Tunneling

  4. Stack

Answer: C

Question No: 236 – (Topic 2)

An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network. Which of the following processes does an IDS perform?

Each correct answer represents a complete solution. Choose all that apply.

  1. Network traffic analysis

  2. Event log analysis

  3. Monitoring and analysis of user and system activity

  4. Statistical analysis of abnormal traffic patterns

Answer: A,B,C,D

Question No: 237 – (Topic 2)

Which of the following tools is used to detect round-robin-load-balancing?

  1. traceroute

  2. tcptrace

  3. TCP SYN scanning

  4. tcptraceroute

Answer: D

Question No: 238 – (Topic 2)

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

  1. Demilitarized zone (DMZ)

  2. Intrusion detection system (IDS)

  3. Firewall

  4. Packet filtering

Answer: B

Question No: 239 – (Topic 2)

Which of the following is the default port for Hypertext Transfer Protocol (HTTP)?

  1. 23

  2. 21

  3. 80

  4. 25

Answer: C

Question No: 240 – (Topic 2)

Which of the following is an example of penetration testing?

  1. Implementing HIDS on a computer

  2. Simulating an actual attack on a network

  3. Implementing NIDS on a network

  4. Configuring firewall to block unauthorized traffic

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.