[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 251-260

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!

Topic 1, Volume A

Question No: 251 – (Topic 2)

Which of the following can be monitored by using the host intrusion detection system (HIDS)?

Each correct answer represents a complete solution. Choose two.

  1. Computer performance

  2. File system integrity

  3. Storage space on computers

  4. System files

Answer: B,D

Question No: 252 – (Topic 2)

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. Your manager requires you migrate the network to IPv6-enabled network without affecting any client computers. Which of the following actions will you take to accomplish the task?

  1. Configure stub zone on the DNS servers in the network.

  2. Configure GlobalNames zones on the DNS servers in the network.

  3. Install a new Windows Server 2003 DNS server computer on each domain and configure GlobalNames zones.

  4. Configure the client computers to use WINS.

Answer: B

Question No: 253 – (Topic 2)

Which of the following are open-source vulnerability scanners?

  1. Nessus

  2. NetRecon

  3. Hackbot

  4. Nikto

Answer: A,C,D

Question No: 254 – (Topic 2)

Which of the following limits the number of packets seen by tcpdump?

  1. Sender filtering

  2. IFilters

  3. BPF-based filter

  4. Recipient filtering

Answer: C

Question No: 255 – (Topic 2)

Which of the following is the default port for TACACS?

  1. UDP port 49

  2. TCP port 80

  3. TCP port 25

  4. TCP port 443

Answer: A

Question No: 256 – (Topic 2)

Which of the following utilities provides information as per the format given below?

Ensurepass 2017 PDF and VCE




  4. PING

Answer: A

Question No: 257 – (Topic 2)

Which of the following is the default port used by Simple Mail Transfer Protocol (SMTP)?

  1. 80

  2. 25

  3. 20

  4. 21

Answer: B

Question No: 258 – (Topic 2)

Which of the following protocols is used by TFTP as a file transfer protocol?

  1. UDP

  2. SNMP

  3. TCP

  4. SMTP

Answer: A

Question No: 259 CORRECT TEXT – (Topic 2)

Fill in the blank with the appropriate term.

is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.

Answer: Ingress filtering

Question No: 260 – (Topic 2)

Adam works as a Security Administrator for Umbrella. A project has been assigned to him to test the network security of the company. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a company#39;s icon to mark the progress of the test. Adam successfully embeds a keylogger. He also added some statistics on the webpage. The firewall protects the network well and allows strict Internet access.

How was security compromised and how did the firewall respond?

  1. The attack was Cross Site Scripting and the firewall blocked it.

  2. Security was not compromised as the webpage was hosted internally.

  3. The attack was social engineering and the firewall did not detect it.

  4. Security was compromised as keylogger is invisible for firewall.

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.