[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 61-70

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIA.html

Topic 1, Volume A

Question No: 61 – (Topic 1)

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone. Which of the following commands will you use to accomplish the task?

  1. Dnscmd lt;server namegt; /config /enableglobalnames 1

  2. Dnscmd lt;server namegt; /config /enableglobalnamessupport 0

  3. Dnscmd lt;server namegt; /config /enableglobalnamessupport 1

  4. Dnscmd lt;server namegt; /config /globalnamesqueryorder 0

Answer: C

Question No: 62 – (Topic 1)

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses #39;Faulkner#39; as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew#39;s password?

Each correct answer represents a complete solution. Choose all that apply.

  1. Buffer-overflow attack

  2. Brute force attack

  3. Dictionary-based attack

  4. Password guessing

  5. Social engineering

  6. Zero-day attack

  7. Denial-of-service (DoS) attack

  8. Rainbow attack

Answer: B,C,D,E,H

Question No: 63 – (Topic 1)

John enters a URL http://www.cisco.com/web/learning in the web browser. A web page appears after he enters the URL. Which of the following protocols is used to resolve www.cisco.com into the correct IP address?

  1. DNS

  2. SMTP

  3. DHCP

  4. ARP

Answer: A

Question No: 64 – (Topic 1)

Which of the following types of firewall functions at the Session layer of OSI model?

  1. Circuit-level firewall

  2. Switch-level firewall

  3. Packet filtering firewall

  4. Application-level firewall

Answer: A

Question No: 65 – (Topic 1)

Mark works as the Network Administrator of a Windows 2000 based network. The network has a DNS server installed. He experiences host name resolution problems on the network. In order to rectify the situation, he wants to troubleshoot DNS name resolution problems on the network.

Which of the following tools will he use to do this?

  1. NSLOOKUP

  2. IPCONFIG

  3. NBTSTAT

  4. NETSTAT

Answer: A

Question No: 66 – (Topic 1)

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?

Each correct answer represents a complete solution. Choose all that apply.

  1. Names of the victims

  2. Date and time of incident

  3. Nature of harassment

  4. Location of each incident

Answer: A,B,D

Question No: 67 – (Topic 1)

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server

2008 network environment. The servers on the network run Windows Server 2008 R2. All client computers on the network run Windows 7 Ultimate. You have configured DirectAccess feature on the laptop of few sales managers so that they can access corporate network from remote locations. Their laptops run Windows 7 Ultimate. Which of the following options does the DirectAccess use to keep data safer while traveling through travels public networks?

  1. IPv6-over-IPsec

  2. IPSec-over-IPv4

  3. VPN

  4. SSL

Answer: A

Question No: 68 – (Topic 1)

Which of the following tools is used to detect spam email without checking the content?

  1. Kismet

  2. EtherApe

  3. DCC

  4. Sniffer

Answer: C

Question No: 69 – (Topic 1)

Fill in the blank with the appropriate facts regarding IP version 6 (IPv6).

IP addressing version 6 uses -bit address. Its IP address assigned to a single host allows the host to send and receive data.

A.

IP addressing version 6 uses 128 -bit address. Its unicast IP address assigned to a single host allows the host to send and receive data.

Answer: A

Question No: 70 – (Topic 1)

You work as a Network Administrator for a bank. For securing the bank#39;s network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network.

After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed. What type of response is the IDS giving?

  1. False Positive

  2. True Negative

  3. False Negative

  4. True Positive

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.