[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 261-270

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 261 – (Topic 2)

Which of the following commands prints out the headers of packets regarding the boolean expression?

  1. tcpdump

  2. vmstat

  3. iftop

  4. iostat

Answer: A

Question No: 262 – (Topic 2)

Which of the following protocols is used by e-mail servers to send messages?

  1. SNMP

  2. FTP

  3. POP3

  4. SMTP

  5. HTTP

Answer: D

Question No: 263 – (Topic 2)

Which of the following statements about the traceroute utility are true? Each correct answer represents a complete solution. Choose all that apply.

  1. It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection Systems.

  2. It records the time taken for a round trip for each packet at each router.

  3. It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host.

  4. It is an online tool that performs polymorphic shell code attacks.

Answer: B,C

Question No: 264 – (Topic 2)

Which of the following utilities can generate a local static route table? Each correct answer represents a complete solution. Choose two.

  1. ROUTE

  2. PING

  3. NETSTAT

  4. TRACERT

  5. NBTSTAT

Answer: A,C

Question No: 265 – (Topic 2)

Which of the following command line tools are available in Helix Live acquisition tool on Windows?

Each correct answer represents a complete solution. Choose all that apply.

  1. netstat

  2. ipconfig

  3. .cab extractors

  4. whois

Answer: A,B,C

Question No: 266 – (Topic 2)

You work as a Network Administrator for McRobert Inc. You plan to configure your Windows Vista computer for Internet access. To achieve this, which of the following communication protocols needs to be bound to the dial-up adapter?

  1. TCP/IP

  2. DLC

  3. NetBEUI

  4. AppleTalk

Answer: A

Question No: 267 – (Topic 2)

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

  1. Fragmentation overlap attack

  2. Evasion attack

  3. Fragmentation overwrite attack

  4. Insertion attack

Answer: D

Question No: 268 – (Topic 2)

You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer#39;s log:

45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72

Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?

  1. 41, UDP

  2. 16, ICMP

  3. 41, TCP

  4. 16, UDP

Answer: C

Question No: 269 – (Topic 2)

Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

  1. E-mail spoofing

  2. E-mail bombing

  3. E-mail Storm

  4. E-mail Spam

Answer: D

Question No: 270 – (Topic 2)

Which of the following ports is the default port for IMAP4 protocol?

  1. TCP port 143

  2. TCP port 25

  3. TCP port 443

  4. TCP port 80

Answer: A

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.