[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 271-280

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 271 – (Topic 2)

Which of the following tools implements a portable framework in tcpdump for capturing low- level network traffics in UNIX like networks?

  1. SysPcap

  2. libpcap

  3. BinPcap

  4. WinPcap

Answer: B

Question No: 272 – (Topic 2)

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a compromised system of a cyber criminal, who hides some information in his computer. This computer runs on Linux operating system. Adam wants to extract the data units of a file, which is specified by its meta-data address. He is using the Sleuth Kit for this purpose. Which of the following commands in the Sleuth kit will he use to accomplish the task?

  1. dcat

  2. istat

  3. ifind

  4. icat

Answer: D

Question No: 273 – (Topic 2)

You are using the TRACERT utility to trace the route to passguide.com. You receive the following output:

Which of the following conclusions can you draw from viewing the output? Each correct answer represents a complete solution. Choose two.

  1. Everything is fine.

  2. One of the routers on the path to the destination is not functional.

  3. The destination computer is not operational.

  4. The IP address of the destination computer is not resolved.

Answer: B,C

Question No: 274 – (Topic 2)

You work as a Network Administrator for NetTech Inc. The company has a Windows

Server 2008 domain-based network. The network contains Windows Server 2008 based two-node Network Load Balancing (NLB) cluster named Info.nettech.com. The cluster is implemented for high availability and load balancing for the company#39;s intranet Web site. You find that the users can see the Network Load Balancing (NLB) cluster on the network neighborhood. The users are able to connect to various services by using the Info.nettech.com. The cluster is configured with the one port rule that equally balances all TCP/IP traffic across the cluster nodes. You want to configure the cluster to accept only HTTP traffic. What will you do to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

  1. Create a new port rule to allow TCP port 110.

  2. Reconfigure the Network Load Balancing (NLB) cluster.

  3. Delete the default port rules by using Network Load Balancing cluster console.

  4. Create a new port rule to allow TCP port 80.

    Answer: C,D

    Question No: 275 – (Topic 2)

    Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography.

    Victor performs the following techniques to accomplish the task:

    1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

    2. Reducing noise by adjusting color and averaging pixel value.

    3. Sharpening, Rotating, Resampling, and Softening the image. Which of the following Steganography attacks is Victor using?

      1. Chosen-Stego Attack

      2. Active Attacks

      3. Stegdetect Attack

      4. Steg-Only Attack

Answer: B

Question No: 276 – (Topic 2)

Which of the following tools is used to store the contents of a TDB (Trivial Database) file to the standard output when debugging problems with TDB files?

  1. tcpdump

  2. pdbedit

  3. Winbindd

  4. tdbdump

Answer: D

Question No: 277 – (Topic 2)

The National Shoes Inc. has an SNMP enabled router installed on its network. IT Manager wants to monitor all SNMP traffic generated by the router. So, he installs a Network Monitor on a Windows2000 Server computer on the network. The router is configured to send traps to an SNMP manager installed on another server. He wants to get a notification whenever the network router raises an SNMP trap. What will he do to achieve this?

(Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a part of the solution. Choose two.

  1. Install an SNMP manager on the router.

  2. Start the Windows 2000 Alert Service on the server.

  3. Create a TCP/IP filter on the server.

  4. Create a Network Monitor filter that has a pattern match for SNMP traffic.

  5. Create a Network Monitor trigger to run the NET SEND command.

  6. Configure the network router to trap the IP address of the server.

Answer: D,E

Question No: 278 – (Topic 2)

Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

  1. Application protocol-based intrusion detection system (APIDS)

  2. Protocol-based intrusion detection system (PIDS)

  3. Network intrusion detection system (NIDS)

  4. Host-based intrusion detection system (HIDS)

Answer: D

Question No: 279 – (Topic 2)

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

  1. Signature-based

  2. Network-based

  3. File-based

  4. Anomaly-based

Answer: D

Question No: 280 – (Topic 2)

Which of the following best describes the term protocol?

  1. The ability to move data through layers of the OSI model.

  2. The combination of cable type and access method used on a network.

  3. A set of rules.

  4. The permissible amount of data contained in a packet.

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.