[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 31-40

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 31 – (Topic 1)

Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

  1. CHKDSK /I

  2. CHKDSK /R /F

  3. CHKDSK /C /L

  4. CHKDSK /V /X

Answer: B

Question No: 32 – (Topic 1)

Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?

  1. D

  2. N

  3. Z

  4. C

Answer: B

Question No: 33 – (Topic 1)

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

  1. Linux Live CD

  2. DOS boot disk

  3. Secure Authentication for EnCase (SAFE)

  4. EnCase with a hardware write blocker

Answer: C

Question No: 34 – (Topic 1)

Which of the following statements are true about an IPv6 network?

Each correct answer represents a complete solution. Choose all that apply.

  1. For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.

  2. It increases the number of available IP addresses.

  3. It provides improved authentication and security.

  4. It uses 128-bit addresses.

  5. It uses longer subnet masks than those used in IPv4.

Answer: A,B,C,D

Question No: 35 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

  1. PsExec

  2. PsList

  3. Fpipe

  4. Cain

Answer: C

Question No: 36 – (Topic 1)

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.

Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

  1. Anamoly-based detection

  2. Policy-based detection

  3. Honey pot detection

  4. Signature-based detection

Answer: D

Question No: 37 HOTSPOT – (Topic 1)

You work as a Network Administrator for McRobert Inc. The company#39;s Windows 2000- based network is configured with Internet Security and Acceleration (ISA) Server 2000. You are configuring intrusion detection on the server. You want to get notified when a TCP SYN packet is sent with a spoofed source IP address and port number that match the destination IP address and port number. Mark the alert that you will enable on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box to accomplish the task.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Question No: 38 – (Topic 1)

Which of the following well-known ports is used by BOOTP?

  1. TCP 161

  2. UDP 69

  3. TCP 21

  4. UDP 67

Answer: D

Question No: 39 – (Topic 1)

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

  1. Risk analysis

  2. Cryptography

  3. Firewall security

  4. OODA loop

Answer: B

Question No: 40 – (Topic 1)

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

  1. The application layer port numbers and the transport layer headers

  2. The presentation layer headers and the session layer port numbers

  3. The network layer headers and the session layer port numbers

  4. The transport layer port numbers and the application layer headers

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.