Pass4itsure > GIAC > GIAC Information Security > GCIA > GCIA Online Practice Questions and Answers

GCIA Online Practice Questions and Answers

Questions 4

Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

A. CHKDSK /I

B. CHKDSK /R /F

C. CHKDSK /C /L

D. CHKDSK /V /X

Buy Now
Questions 5

Users on a TCP/IP network are able to ping resources using IP addresses. However, they are unable to connect to those resources through their host names. A malfunction or failure of which of the following servers may be the cause of the issue?

A. Proxy

B. DHCP

C. DNS

D. WINS

Buy Now
Questions 6

You are responsible for security at a company that specializes in e-commerce. You realize that given the high volume of Web traffic, there is a significant chance of someone being able to breach your perimeter. You want to make sure that should this occur, you can redirect the attacker away from sensitive data. How would you best accomplish this?

A. Implement a passive IDS

B. Implement a honey pot.

C. Implement a stateful packet inspection firewall.

D. Implement a network based IDS.

Buy Now
Questions 7

Which of the following encryption methods are used by the BlackBerry to provide security to the data stored in it? Each correct answer represents a complete solution. Choose two.

A. Triple DES

B. Blowfish

C. AES

D. RSA

Buy Now
Questions 8

Which of the following is an example of a firewall?

A. ZoneAlarm

B. PatriotBox

C. Specter

D. KFSensor

Buy Now
Questions 9

Which of the following partitions contains the system files that are used to start the operating system?

A. Boot partition

B. System partition

C. Secondary partition

D. Primary partition

Buy Now
Questions 10

Which of the following image file formats uses a lossy data compression technique?

A. GIF

B. JPG

C. PNG

D. TIF

Buy Now
Questions 11

What is the maximum size of an IP datagram for Ethernet?

A. 4500 bytes

B. 1024 bytes

C. 1200 bytes

D. 1500 bytes

Buy Now
Questions 12

Sniffer operates at which layer of the OSI reference model?

A. Data Link

B. Physical

C. Transport

D. Presentation

Buy Now
Questions 13

Which of the following statements are true about snort? Each correct answer represents a complete solution. Choose all that apply.

A. It develops a new signature to find vulnerabilities.

B. It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS clients.

C. It encrypts the log file using the 256 bit AES encryption scheme algorithm.

D. It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connections.

Buy Now
Exam Code: GCIA
Exam Name: GIAC Certified Intrusion Analyst
Last Update: Apr 21, 2024
Questions: 507
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99