[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 71-80

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!

Topic 1, Volume A

Question No: 71 – (Topic 1)

Which of the following commands in MQC tool matches IPv4 and IPv6 packets when IP parameter is missing?

  1. Match access-group

  2. Match fr-dlci

  3. Match IP precedence

  4. Match cos

Answer: C

Question No: 72 – (Topic 1)

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member

servers and 150 Windows Vista client computers. According to the company#39;s security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?

  1. Configure Internet Protocol Security (IPSec).

  2. Configure Network address translation (NAT).

  3. Disable Windows firewall logging.

  4. Enable Windows firewall logging.

Answer: D

Question No: 73 – (Topic 1)

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate the DoS attack on a computer network of SecureEnet Inc. Which of the following methods will you perform to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Look for core files or crash dumps on the affected systems.

  2. Sniff network traffic to the failing machine.

  3. Seize all computers and transfer them to the Forensic lab.

  4. Look for unusual traffic on Internet connections and network segments.

Answer: A,B,D

Question No: 74 – (Topic 1)

You work as a Network Administrator for Tech2tech Inc. You have configured a network- based IDS for your company.

You have physically installed sensors at all key positions throughout the network such that they all report to the command console.

What will be the key functions of the sensors in such a physical layout? Each correct answer represents a complete solution. Choose all that apply.

  1. To collect data from operating system logs

  2. To notify the console with an alert if any intrusion is detected

  3. To analyze for known signatures

  4. To collect data from Web servers

Answer: B,C

Question No: 75 – (Topic 1)

Which of the following is the default port for File Transport Protocol (FTP)?

  1. 21

  2. 25

  3. 23

  4. 80

Answer: A

Question No: 76 – (Topic 1)

Nathan works as a professional Ethical Hacker. He wants to see all open TCP/IP and UDP ports of his computer. Nathan uses the netstat command for this purpose but he is still unable to map open ports to the running process with PID, process name, and path. Which of the following commands will Nathan use to accomplish the task?

  1. ping

  2. Psloggedon

  3. Pslist

  4. fport

Answer: D

Question No: 77 – (Topic 1)

Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

  1. Fpipe

  2. tcptraceroute

  3. Sniffer

  4. tcptrace

Answer: D

Question No: 78 – (Topic 1)

Which of the following log files are used to collect evidences before taking the bit-stream image of the BlackBerry?

Each correct answer represents a complete solution. Choose all that apply.

  1. user history

  2. Transmit/Receive

  3. Radio status

  4. Roam and Radio

Answer: B,C,D

Question No: 79 – (Topic 1)

Which of the following organizations is dedicated to computer security research and information sharing?

  1. FBI

  2. NIPC

  3. Honeynet Project

  4. IEEE

Answer: C

Question No: 80 – (Topic 1)

Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?

Each correct answer represents a complete solution. Choose all that apply.

  1. Address Resolution Protocol (ARP)

  2. Network Link Protocol (NWLink)

  3. Internet Control Message Protocol (ICMP)

  4. User Datagram Protocol (UDP)

Answer: A,C,D

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.