[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 41-50

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 41 – (Topic 1)

Which of the following commands will you use with the tcpdump command to display the contents of the packets?

  1. tcpdump -q

  2. tcpdump -v

  3. tcpdump -n

  4. tcpdump -A

Answer: D

Question No: 42 – (Topic 1)

You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?

  1. ping -a

  2. ping -4

  3. ping -t

  4. ping -l

Answer: D

Question No: 43 – (Topic 1)

You work as a Network Administrator for Rick International. The company has a TCP/IP- based network. A user named Kevin wants to set an SSH terminal at home to connect to the company#39;s network. You have to configure your company#39;s router for it. By default, which of the following standard ports does the SSH protocol use for connection?

  1. 80

  2. 21

C. 443

D. 22

Answer: D

Question No: 44 – (Topic 1)

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

A. A3-07-B9-E3-BC-F9

B. 132.298.1.23

C. F936.28A1.5BCD.DEFA

D. 1011-0011-1010-1110-1100-0001

Answer: A

Question No: 45 – (Topic 1)

Which of the following standard file formats is used by Apple#39;s iPod to store contact information?

  1. HFS

  2. vCard

  3. FAT32

  4. hCard

Answer: B

Question No: 46 – (Topic 1)

Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?

  1. Request for service, initial analysis, data collection, data reporting, data analysis

  2. Initial analysis, request for service, data collection, data analysis, data reporting

  3. Initial analysis, request for service, data collection, data reporting, data analysis

  4. Request for service, initial analysis, data collection, data analysis, data reporting

Answer: D

Question No: 47 – (Topic 1)

Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?

  1. MAK ID

  2. IP address

  3. IP identification number

  4. SSID

Answer: C

Question No: 48 – (Topic 1)

Which of the following is the difference between SSL and S-HTTP?

  1. SSL operates at the network layer and S-HTTP operates at the application layer.

  2. SSL operates at the transport layer and S-HTTP operates at the application layer.

  3. SSL operates at the application layer and S-HTTP operates at the transport layer.

  4. SSL operates at the application layer and S-HTTP operates at the network layer.

Answer: B

Question No: 49 – (Topic 1)

Which of the following applications cannot proactively detect anomalies related to a computer?

  1. NIDS

  2. Firewall installed on the computer

  3. HIDS

  4. Anti-virus scanner

Answer: A

Question No: 50 – (Topic 1)

Which of the following terms is used to represent IPv6 addresses?

  1. Colon-dot

  2. Colon-hexadecimal

  3. Hexadecimal-dot notation

  4. Dot notation

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.