[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIA Dumps with VCE and PDF 81-90

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!

Topic 1, Volume A

Question No: 81 – (Topic 1)

Which of the following commands displays the IPX routing table entries?

  1. sh ipx traffic

  2. sh ipx route

  3. sh ipx int e0

  4. sho ipx servers

Answer: B

Question No: 82 – (Topic 1)

Users on a TCP/IP network are able to ping resources using IP addresses. However, they are unable to connect to those resources through their host names. A malfunction or failure of which of the following servers may be the cause of the issue?

  1. Proxy

  2. DHCP

  3. DNS

  4. WINS

Answer: C

Question No: 83 – (Topic 1)

Which method would provide the highest level of protection for all data transmitted on the internal network only? (Click the Exhibit button on the toolbar to see the case study.)

  1. IPSec tunnel mode

  2. SSL

  3. PPTP

  4. SMB

  5. IPSec transport mode

Answer: E

Question No: 84 – (Topic 1)

Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with the project of investigating an iPod, which is suspected to contain some explicit material. Adam wants to connect the compromised iPod to his system, which is running on Windows XP (SP2) operating system. He doubts that connecting the iPod with his computer may change some evidences and settings in the iPod. He wants to set the iPod to read-only mode. This can be done by changing the registry key within the Windows XP (SP2) operating system. Which of the following registry keys will Adam change to accomplish the task?

  1. HKEY_LOCAL_MACHINE\CurrentControlset\Control\StorageDevicePolicies

  2. HKEY_LOCAL_MACHINE\System\CurrentControlset\StorageDevicePolicies

  3. HKEY_LOCAL_MACHINE\System\CurrentControlset\Control\StorageDevicePolicies

  4. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion

Answer: C

Question No: 85 – (Topic 1)

Which of the following types of cyber stalking damage the reputation of their victim and turn other people against them by setting up their own Websites, blogs or user pages for this purpose?

  1. False accusations

  2. False victimization

  3. Encouraging others to harass the victim

  4. Attempts to gather information about the victim

Answer: A

Question No: 86 – (Topic 1)

Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?

  1. Asterisk logger

  2. Access Pass View

  3. FAU

  4. Galleta

Answer: B

Question No: 87 – (Topic 1)

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network. A firewall has been configured on the network. You configure a filter on the router. You verify that SMTP operations have stopped after the recent configuration. Which of the following ports will you have to open on the router to resolve the issue?

  1. 25

  2. 21

  3. 80

  4. 20

Answer: A

Question No: 88 – (Topic 1)

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. History folder

  2. Download folder

  3. Cookies folder

  4. Temporary Internet Folder

Answer: A,C,D

Question No: 89 – (Topic 1)

You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee of the production department is facing the problem in the IP configuration of the network connection.

He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer. While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command. You enter the following command in the elevated command prompt on the computer:

netsh advfirewall firewall add rule name=quot;ICMPv4quot; protocol=icmpv4:any,any dir=in action=allow

Which of the following actions will this command perform?

  1. Permit ICMPv4 packet to pass through the firewall.

  2. Permit ICMPv4 Echo Request.

  3. Enable packet filtering by Windows Firewall.

  4. Disable Firewall temporarily.

Answer: A

Question No: 90 – (Topic 1)

Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?

  1. Cain

  2. AiroPeek

  3. NetStumbler

  4. Snort

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GCIA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.