[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 51-60

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 51 – (Topic 1)

Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect#39;s computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files,

and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?

  1. Vedit

  2. WinHex

  3. HxD

  4. Evidor

Answer: B

Question No: 52 – (Topic 1)

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

  1. IPTables

  2. OpenSSH

  3. IPChains

  4. Stunnel

Answer: A

Question No: 53 – (Topic 1)

Which of the following port numbers are valid ephemeral port numbers? Each correct answer represents a complete solution. Choose two.

A. 143

B. 1025

C. 161

D. 1080

Answer: B,D

Question No: 54 – (Topic 1)

Which of the following activities will you use to retrieve user names, and info on groups, shares, and services of networked computers?

  1. Network tap

  2. Packet crafting

  3. Network mapping

  4. Network enumerating

Answer: D

Question No: 55 – (Topic 1)

You work as a system administrator for BlueSkwer.com. You are using IPv6 on all computers. You want to ensure that you do not need to manually configure the IPv6 addresses. You want to take advantage of the router discovery features. For router discovery to work properly, what is needed?

  1. A properly configured IPv6 router

  2. Network load balancers

  3. CAT 6 cables

  4. Internet Explorer 8

Answer: A

Question No: 56 – (Topic 1)

Which of the following statements are true about routers?

Each correct answer represents a complete solution. Choose all that apply.

  1. Routers do not limit physical broadcast traffic.

  2. Routers organize addresses into classes, which are used to determine how to move packets from one network to another.

  3. Routers act as protocol translators and bind dissimilar networks.

  4. Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.

Answer: B,C,D

Question No: 57 – (Topic 1)

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

  1. Propagating Cipher Block Chaining (PCBC) Mode

  2. Cipher Block Chaining (CBC) Mode

  3. Electronic Codebook (ECB) Mode

  4. Cipher Feedback (CFB) Mode

Answer: B

Question No: 58 – (Topic 1)

Which of the following wireless security features provides the best wireless security mechanism?

  1. WPA with Pre Shared Key

  2. WPA with 802.1X authentication

  3. WEP

  4. WPA

Answer: B

Question No: 59 – (Topic 1)

With reference to the given case study, one of the security goals requires to configure a secure connection between the Boston distribution center and the headquarters. You want to implement IP filter to fulfill the security requirements. How should you implement IP filters at the headquarters?

(Click the Exhibit button on the toolbar to see the case study.)

  1. Add source filters for the headquarters for UDP port 80 and IP protocol 50.

    Add destination filters for the Boston distribution center for UDP port 80 and IP protocol 50.

  2. Add source filters for the Boston distribution center for UDP port 80 and IP protocol 50. Add destination filters for headquarters for UDP port 80 and IP protocol 50.

  3. Add source filters for the Boston distribution center for UDP port 1701 and IP protocol 50.

    Add destination filters for the headquarters for UDP port 1701 and IP protocol 50.

  4. Add source filters for the headquarters for UDP port 1701 and IP protocol 50.

Add destination filters for the Boston distribution center for UDP port 1701 and IP protocol 50.

Answer: C

Question No: 60 – (Topic 1)

Which of the following password cracking tools can work on the Unix and Linux environment?

  1. Brutus

  2. John the Ripper

  3. Cain and Abel

  4. Ophcrack

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.