[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 311-320

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 311 – (Topic 3)

Which of the following is the best method of accurately identifying the services running on a victim host?

  1. Use of hit and trial method to guess the services and ports of the victim host.

  2. Use of a port scanner to scan each port to confirm the services running.

  3. Use of a vulnerability scanner to try to probe each port to verify which service is running.

  4. Use of the manual method of telnet to each of the open ports.

Answer: D

Question No: 312 – (Topic 3)

Smith works as a Network Administrator for HCP Inc. He sets up a DNS server on the network and enables DNS service on all computers. However, DNS is not working properly. Which of the following commands should Smith use to verify the DNS configuration?

  1. ping

  2. nslookup

  3. tracert

  4. pathping

Answer: B

Question No: 313 – (Topic 3)

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?

Each correct answer represents a complete solution. Choose all that apply.

  1. TIS authentication

  2. Rhosts (rsh-style) authentication

  3. Kerberos authentication

  4. Password-based authentication

Answer: A,B,C

Question No: 314 – (Topic 3)

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone#39;s DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?

Each correct answer represents a complete solution. Choose all that apply.

  1. Dig

  2. Host

  3. NSLookup

  4. DSniff

Answer: A,B,C

Question No: 315 – (Topic 3)

You work as a Network Administrator for McRobert Inc. Your company has a Windows NT

4.0 TCP/IP-based network. You want to list the cache of NetBIOS names and IP addresses. Which of the following utilities will you use?

  1. TELNET

  2. NBTSTAT

  3. TRACERT

  4. NETSTAT

Answer: B

Question No: 316 – (Topic 3)

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

  1. portsentry

  2. libnids

  3. nmap

  4. scanlogd

Answer: A,B,D

Question No: 317 – (Topic 3)

You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network.

You want to know the statistics of each protocol installed on your computer. Which of the following commands will you use?

  1. NBTSTAT -r

  2. NETSTAT -s

  3. NETSTAT -r

  4. NBTSTAT -s

Answer: B

Question No: 318 – (Topic 3)

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP- based network. The network is connected to the Internet through a firewall. A user complains that he is unable to access the abc.com site. However, he can access all other sites. Which of the following tools will help you diagnose the problem?

  1. IPCONFIG

  2. ROUTE

  3. TELNET

  4. TRACERT

Answer: D

Question No: 319 – (Topic 3)

Steve works as a Network Administrator for Blue Tech Inc. All client computers in the company run the Windows Vista operating system. He often travels long distances on official duty. While traveling, he connects to the office server through his laptop by using

remote desktop connection.

He wants to run an application that is available on the server of the company. When he connects to the server, he gets a message that the connection is blocked by the firewall. He returns to his office to resolve the issue. He opens the Windows Firewall Settings dialog box. What actions should he perform in the dialog box given below to accomplish the task?

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

A.

Answer: A

Question No: 320 – (Topic 3)

You work as a desktop administrator for BlueSkwer.com. You are logged on to a Windows 7 computer with administrator rights. You have run the #39;netsh interface IPv6 show interface#39; command which displays the following:

Ensurepass 2017 PDF and VCE

What is the first interface index used for?

  1. 6to4 tunneling

  2. MAC address

  3. Intra-Site Automatic Tunnel Addressing Protocol

  4. Loopback

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.