[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 301-310

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 301 – (Topic 3)

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He scans the We-are-secure server and gets the following result:

sysDescr.0 = STRING. quot;SunOS we-are-secure.com 4.1.3_U1 1 sun4mquot; sysObjectID.0 = OID. enterprises.hp.nm.hpsystem.10.1.1

sysUpTime.0 = Timeticks: (156474552) 18 days, 12:00:09 sysContact.0 = STRING. quot;quot;

sysName.0 = STRING. quot;we-are-secure.comquot; sysLocation.0 = STRING. quot;quot;

sysServices.0 = INTEGER: 6

Which of the following tools is John using to perform the scan?

  1. snmpwalk

  2. Kismet

  3. AirMagnet

  4. AiroPeek

Answer: A

Question No: 302 – (Topic 3)

You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer. While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command. What is the cause of the issue?

  1. Core Networking Firewall rules do not allow IPv4 or IPv6.

  2. Windows Firewall rules do not allow Core Networking Tools.

  3. Windows Firewall blocks the command line tools.

  4. Core Networking Firewall rules do not allow ICMPv4 or ICMPv6 Echo Requests.

Answer: D

Question No: 303 – (Topic 3)

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.

Which of the following DoS attacks is Maria using to accomplish her task?

  1. Smurf DoS attack

  2. Fraggle DoS attack

  3. Ping flood attack

  4. Teardrop attack

Answer: B

Question No: 304 – (Topic 3)

At which port does a DHCPv6 client listen for DHCP messages?

  1. TCP port 546

  2. TCP port 547

  3. UDP port 546

  4. UDP port 547

Answer: C

Question No: 305 – (Topic 3)

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer.

You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?

  1. start /w ocsetup DNS-Server-Core-Role

  2. start /w ocsetup DnsServer

  3. start /w ocsetup DnsServercorerole

  4. net start quot;dns serverquot;

Answer: A

Question No: 306 – (Topic 3)

Where is the Hypertext Transfer Protocol (HTTP) used?

  1. On a client/server-based Wide Area Network (WAN).

  2. On the Internet to download text files and graphic files.

  3. On a peer-to-peer based Local Area Network (LAN).

  4. On the World Wide Web (WWW) to display SQL database statistics.

  5. On the World Wide Web (WWW) to display Hypertext Markup Language (HTML) pages.

Answer: E

Question No: 307 – (Topic 3)

Which of the following are well-known ports?

Each correct answer represents a complete solution. Choose two.

A. 443

B. 21 C. 1024 D. 8080

Answer: A,B

Question No: 308 – (Topic 3)

Which system is designed to analyze, detect, and report on security-related events?

  1. NIPS

  2. HIPS

  3. NIDS

  4. HIDS

Answer: A

Question No: 309 – (Topic 3)

Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows- based environment. The company#39;s employees use Microsoft Outlook Express as their e- mail client program. E-mails of some employees have been deleted due to a virus attack on the network.

Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools can Andrew use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

  1. EventCombMT

  2. R-mail

  3. eMailTrackerPro

  4. FINALeMAIL

Answer: B,D

Question No: 310 – (Topic 3)

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. SARA

  2. Snort

  3. Samhain

  4. Tripwire

Answer: B,C

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.