[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 291-300

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!

Topic 1, Volume A

Question No: 291 – (Topic 2)

Which of the following is a form of cheating or copying someone else#39;s work or idea without acknowledging the source?

  1. Patent

  2. Turnitin

  3. Copyright

  4. Plagiarism

Answer: D

Topic 3, Volume C

Question No: 292 – (Topic 3)

Which of the following switches is used with Pslist command on the command line to show the statistics for all active threads on the system, grouping these threads with their owning process?

  1. Pslist -x

  2. Pslist -m

  3. Pslist -t

  4. Pslist -d

Answer: D

Question No: 293 – (Topic 3)

Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data that are created by the DNS cache poisoning?

  1. Split-horizon DNS

  2. Stub resolver

  3. Domain Name System Extension (DNSSEC)


Answer: C

Question No: 294 – (Topic 3)

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 domainbased network. Mark wants to block all NNTP traffic between the network and the Internet. How will he configure the network?

  1. Disable anonymous logins in the NNTP configuration manager.

  2. Block port 25 by configuring the firewall.

  3. Block port 119 by configuring the firewall.

  4. Block TCP port 80 by configuring the firewall.

Answer: C

Question No: 295 – (Topic 3)

Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.

Peter#39;s manager suspects that someone is trying to log in to his computer in his absence. Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the users who have last logged in to the manager#39;s system?

Each correct answer represents a complete solution. Choose two.

  1. lastb

  2. pwd

  3. last

  4. rwho -a

Answer: A,C

Question No: 296 – (Topic 3)

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf(quot;%squot;, str).

What attack will his program expose the Web application to?

  1. Sequence attack

  2. Cross Site Scripting attack

  3. Format string attack

  4. SQL injection attack

Answer: C

Question No: 297 – (Topic 3)

Which of the following information must the fragments carry for the destination host to reassemble them back to the original unfragmented state?

Each correct answer represents a complete solution. Choose all that apply.

  1. MF flag

  2. Offset field

  3. MAC address

  4. Length of the data

  5. IP address

  6. IP identification number

Answer: A,B,D,F

Question No: 298 – (Topic 3)

Which of the following tables is formed by NTFS file system to keep the track of files, to store metadata, and their location?

  1. The Master File Table

  2. The System File Table

  3. The Master Allocation Table

  4. The File Allocation Table

Answer: A

Question No: 299 – (Topic 3)

Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation?

Each correct answer represents a complete solution. Choose two.

  1. CRC

  2. HAVAL

  3. Twofish

  4. MD5

Answer: A,D

Question No: 300 – (Topic 3)

Which of the following monitors program activities and modifies malicious activities on a system?


  2. NIDS

  3. Back door

  4. HIDS

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.