Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GCIA GCIA – GIAC Certified Intrusion Analyst Practice Test Questions and Answers

Questions 4

Which of the following is not a Denial of Service (DoS) attack?

Options:

A.

Smurf attack

B.

Code injection attack

C.

Ping of Death attack

D.

Teardrop attack

Buy Now
Questions 5

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used.

He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about programs like Hping2 that can get into a network through covert channels.

Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?

Options:

A.

Block ICMP type 13 messages

B.

Block all outgoing traffic on port 21

C.

Block all outgoing traffic on port 53

D.

Block ICMP type 3 messages

Buy Now
Questions 6

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

True negative

B.

True positive

C.

False negative

D.

False positive

Buy Now
Questions 7

Which of the following proxy servers is also referred to as transparent proxies or forced proxies?

Options:

A.

Tunneling proxy server

B.

Reverse proxy server

C.

Anonymous proxy server

D.

Intercepting proxy server

Buy Now
Questions 8

Which of the following techniques is used to identify attacks originating from a botnet?

Options:

A.

IFilter

B.

BPF-based filter

C.

Passive OS fingerprinting

D.

Recipient filtering

Buy Now
Questions 9

Which of the following applications cannot proactively detect anomalies related to a computer?

Options:

A.

NIDS

B.

Firewall installed on the computer

C.

HIDS

D.

Anti-virus scanner

Buy Now
Questions 10

Which of the following types of Intrusion detection systems (IDS) is used for port mirroring?

Options:

A.

Port address-based IDS

B.

Network-based IDS (NIDS)

C.

Host-based IDS (HIDS)

D.

Anomaly-based IDS

Buy Now
Questions 11

Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?

Options:

A.

Dialler attack

B.

Denial of service

C.

Eavesdropping

D.

Intrusion

Buy Now
Questions 12

Which of the following file systems is designed by Sun Microsystems?

Options:

A.

NTFS

B.

CIFS

C.

ZFS

D.

ext2

Buy Now
Questions 13

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

Options:

A.

Dsniff

B.

Libnids

C.

Cain

D.

LIDS

Buy Now
Questions 14

Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?

Options:

A.

Cain

B.

AiroPeek

C.

NetStumbler

D.

Snort

Buy Now
Questions 15

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

Options:

A.

Active IDS

B.

Signature-based IDS

C.

Passive IDS

D.

Network-based IDS

Buy Now
Questions 16

Which of the following is the difference between SSL and S-HTTP?

Options:

A.

SSL operates at the network layer and S-HTTP operates at the application layer.

B.

SSL operates at the transport layer and S-HTTP operates at the application layer.

C.

SSL operates at the application layer and S-HTTP operates at the transport layer.

D.

SSL operates at the application layer and S-HTTP operates at the network layer.

Buy Now
Questions 17

Fill in the blank with the appropriate facts regarding IP version 6 ( IPv6 ).

IP addressing version 6 uses_____ -bit address. Its____ IP address assigned to a single host allows the host to send and receive data.

Options:

A.

IP addressing version 6 uses 128 -bit address. Its unicast IP address assigned to a single host allows the host to send and receive data.

Buy Now
Questions 18

John enters a URL http://www.cisco.com/web/learning in the web browser. A web page appears after he enters the URL. Which of the following protocols is used to resolve www.cisco.com into the correct IP address?

Options:

A.

DNS

B.

SMTP

C.

DHCP

D.

ARP

Buy Now
Questions 19

Which of the following password cracking tools can work on the Unix and Linux environment?

Options:

A.

Brutus

B.

John the Ripper

C.

Cain and Abel

D.

Ophcrack

Buy Now
Questions 20

In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?

Options:

A.

Insertion

B.

Session splicing

C.

Fragmentation overlap

D.

Fragmentation overwrite

Buy Now
Questions 21

What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

Options:

A.

Sircam

B.

Stoner

C.

Code Red

D.

Brain

Buy Now
Questions 22

What is the order of the extension headers that is followed by IPv6?

Options:

A.

Destination Options (first), Routing, IPv6 header, Hop-by-Hop, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

B.

Routing, Hop-by-Hop, Destination Options (first), Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

C.

Fragment, Routing, Hop-by-Hop, Destination Options (first), Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

D.

IPv6 header, Hop-by-Hop, Destination Options (first), Routing, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

Buy Now
Questions 23

Which of the following can be monitored by using the host intrusion detection system (HIDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Computer performance

B.

File system integrity

C.

Storage space on computers

D.

System files

Buy Now
Questions 24

Which of the following attacks is used to hack simple alphabetical passwords?

Options:

A.

Dictionary-based attack

B.

Sniffing

C.

Man-in-the-middle attack

D.

Black hat attack

Buy Now
Questions 25

Which of the following ports is used by e-mail clients to send request to connect to the server?

Options:

A.

Port 21

B.

Port 20

C.

Port 23

D.

Port 25

Buy Now
Questions 26

Which of the following software is used for Steganography?

Options:

A.

CryptoForge

B.

Fort Knox

C.

Dsniff

D.

Ethreal

Buy Now
Questions 27

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

Options:

A.

Spoofing

B.

Sending deceptive e-mails

C.

Network Configuration Changes

D.

Shunning

E.

Logging

F.

Sending notifications

Buy Now
Questions 28

John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company ' s phone bill has increased drastically. John suspects that the company ' s phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?

Options:

A.

War dialing

B.

Sequence++ attack

C.

Phreaking

D.

Man-in-the-middle attack

Buy Now
Questions 29

Which of the following log files are used to collect evidences before taking the bit-stream image of the BlackBerry?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

user history

B.

Transmit/Receive

C.

Radio status

D.

Roam and Radio

Buy Now
Questions 30

This tool is known as __________.

Options:

A.

Kismet

B.

Absinthe

C.

NetStumbler

D.

THC-Scan

Buy Now
Questions 31

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be the most help against Denial of Service (DOS) attacks?

Options:

A.

Network surveys.

B.

Honey pot

C.

Packet filtering firewall

D.

Stateful Packet Inspection (SPI) firewall

Buy Now
Questions 32

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.

Chosen-Stego Attack

B.

Active Attacks

C.

Stegdetect Attack

D.

Steg-Only Attack

Buy Now
Questions 33

Which of the following statements are true about UDP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

TFTP uses a UDP port for communication.

B.

UDP is an unreliable protocol.

C.

FTP uses a UDP port for communication.

D.

UDP works at the data-link layer of the OSI model.

E.

UDP is a connectionless protocol.

Buy Now
Questions 34

Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?

Options:

A.

tcpdump -A file_name

B.

tcpdump -D file_name

C.

tcpdump -X file_name

D.

tcpdump -F file_name

Buy Now
Questions 35

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate Plagiarism occurred in the source code files of C#. Which of the following tools will you use to detect the software plagiarism?

Options:

A.

VAST

B.

Jplag

C.

SCAM

D.

Turnitin

Buy Now
Questions 36

Which of the following is not a function of the Snort utility?

Options:

A.

Routing messages

B.

Packet sniffing

C.

Packet logging

D.

Intrusion detection

Buy Now
Questions 37

In which of the following attacks does a hacker imitate a DNS server and obtain the entire DNS database?

Options:

A.

DNS poisoning attack

B.

Illicit zone transfer attack

C.

Illicit poisoning attack

D.

DNS transfer attack

Buy Now
Questions 38

John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company ' s phone bill has increased drastically. John suspects that the company ' s phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?

Options:

A.

Sequence++ attack

B.

Phreaking

C.

Man-in-the-middle attack

D.

War dialing

Buy Now
Questions 39

You work as a desktop administrator for BlueSkwer.com. You are logged on to a Windows 7 computer with administrator rights. You have run the ' netsh interface IPv6 show interface ' command which displays the following:

GCIA Question 39

What is the first interface index used for?

Options:

A.

6to4 tunneling

B.

MAC address

C.

Intra-Site Automatic Tunnel Addressing Protocol

D.

Loopback

Buy Now
Questions 40

Which of the following tools can be used to check whether the network interface is in promiscuous mode or not?

Options:

A.

IPTraf

B.

MRTG

C.

Chkrootkit

D.

Ntop

Buy Now
Questions 41

Which of the following is used for remote file access by UNIX/Linux systems?

Options:

A.

Server Message Block (SMB)

B.

Network File System (NFS)

C.

Common Internet File System (CIFS)

D.

NetWare Core Protocol (NCP)

Buy Now
Questions 42

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

Options:

A.

These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

B.

These are the threats intended to flood a network with large volumes of access requests.

C.

These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

D.

These are the threats that originate from within the organization.

Buy Now
Questions 43

Which of the following statements are true about routers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Routers do not limit physical broadcast traffic.

B.

Routers organize addresses into classes, which are used to determine how to move packets from one network to another.

C.

Routers act as protocol translators and bind dissimilar networks.

D.

Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.

Buy Now
Questions 44

What is the maximum size of an IP datagram for Ethernet?

Options:

A.

4500 bytes

B.

1024 bytes

C.

1200 bytes

D.

1500 bytes

Buy Now
Questions 45

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses ' Faulkner ' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew ' s password?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Zero-day attack

B.

Dictionary-based attack

C.

Rainbow attack

D.

Denial-of-service (DoS) attack

E.

Brute force attack

F.

Buffer-overflow attack

G.

Password guessing

Buy Now
Questions 46

Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

Options:

A.

Ping of Death attack

B.

DDoS attack

C.

SYN flood attack

D.

Teardrop attack

Buy Now
Questions 47

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Options:

A.

PsExec

B.

PsList

C.

Fpipe

D.

Cain

Buy Now
Questions 48

Which of the following can be applied as countermeasures against DDoS attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Limiting the amount of network bandwidth

B.

Blocking IP address

C.

Using LM hashes for passwords

D.

Using Intrusion detection systems

E.

Using the network-ingress filtering

Buy Now
Questions 49

Which of the following ports is used by Layer 2 Tunneling Protocol (L2TP)?

Options:

A.

UDP port 1701

B.

UDP port 67

C.

TCP port 23

D.

TCP port 25

Buy Now
Questions 50

Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?

Options:

A.

Non persistent

B.

SAX

C.

Persistent

D.

Document Object Model (DOM)

Buy Now
Questions 51

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SARA

B.

Snort

C.

Samhain

D.

Tripwire

Buy Now
Questions 52

Which of the following information must the fragments carry for the destination host to reassemble them back to the original unfragmented state?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

MF flag

B.

Offset field

C.

MAC address

D.

Length of the data

E.

IP address

F.

IP identification number

Buy Now
Questions 53

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a compromised system of a cyber criminal, who hides some information in his computer. This computer runs on Linux operating system. Adam wants to extract the data units of a file, which is specified by its meta-data address. He is using the Sleuth Kit for this purpose. Which of the following commands in the Sleuth kit will he use to accomplish the task?

Options:

A.

dcat

B.

istat

C.

ifind

D.

icat

Buy Now
Questions 54

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses ' Faulkner ' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew ' s password?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Buffer-overflow attack

B.

Brute force attack

C.

Dictionary-based attack

D.

Password guessing

E.

Social engineering

F.

Zero-day attack

G.

Denial-of-service (DoS) attack

Buy Now
Questions 55

Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?

Options:

A.

Asterisk logger

B.

Access Pass View

C.

FAU

D.

Galleta

Buy Now
Questions 56

Which method would provide the highest level of protection for all data transmitted on the internal network only? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

IPSec tunnel mode

B.

SSL

C.

PPTP

D.

SMB

E.

IPSec transport mode

Buy Now
Questions 57

You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

Options:

A.

Site-local

B.

Global unicast

C.

Local-link

D.

Loopback

Buy Now
Questions 58

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Tcpdump

B.

Ettercap

C.

Mendax

D.

Fragroute

Buy Now
Questions 59

Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Address Resolution Protocol (ARP)

B.

Network Link Protocol (NWLink)

C.

Internet Control Message Protocol (ICMP)

D.

User Datagram Protocol (UDP)

Buy Now
Questions 60

Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot. Andrew wants to check the booting process. He suspects that an error persists in the bootloader of Mac OS X. Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?

Options:

A.

LILO

B.

BootX

C.

NT Loader

D.

GRUB

Buy Now
Questions 61

Which of the following commands will you use to display ARP packets in the snort-output?

Options:

A.

snort -v -i eth 0

B.

snort -d -v -i eth 0

C.

snort -dev -i eth 0

D.

snort -deva -i eth 0

Buy Now
Questions 62

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:

A.

IPTables

B.

OpenSSH

C.

IPChains

D.

Stunnel

Buy Now
Questions 63

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

Options:

A.

libpcap

B.

WinPCap

C.

PCAP

D.

SysPCap

Buy Now
Questions 64

Which of the following ports is used by e-mail clients to send request to connect to the server?

Options:

A.

Port 23

B.

Port 21

C.

Port 25

D.

Port 20

Buy Now
Questions 65

Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

Options:

A.

Data control and Media Access control

B.

Logical control and Link control

C.

Logical Link control and Media Access control

D.

Machine Link control and Logical Link control

Buy Now
Questions 66

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has written the following snort signature:

GCIA Question 66

Which of the following statements about this snort signature is true?

Options:

A.

It detects the session splicing IDS evasion attack.

B.

It detects AOL IM chat.

C.

It detects Yahoo IM chat.

D.

It detects the bad file attachments coming to the mail server.

Buy Now
Questions 67

You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows Server 2008 member servers and 120 Windows Vista client computers. You are implementing a caching-only DNS server on one of the member servers. Your assistant wants to know about the caching-only DNS server. Which of the following statements about the caching-only DNS server are correct?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It hosts zones and authoritative for a particular domain.

B.

It reduces the amount of DNS traffic on a Wide Area Network (WAN)

C.

It is useful at a site where DNS functionality is needed locally but there is not a requirement for a separate domain for that location.

D.

It performs queries, caches the answers, and returns the results.

Buy Now
Questions 68

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.

Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

Options:

A.

Anamoly-based detection

B.

Policy-based detection

C.

Honey pot detection

D.

Signature-based detection

Buy Now
Questions 69

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. You have recently come to know about the Slammer worm, which attacked computers in 2003 and doubled the number of infected hosts every 9 seconds or so. Slammer infected 75000 hosts in the first 10 minutes of the attack. To mitigate such security threats, you want to configure security tools on the network. Which of the following tools will you use?

Options:

A.

Intrusion Prevention Systems

B.

Firewall

C.

Intrusion Detection Systems

D.

Anti-x

Buy Now
Questions 70

Which of the following commands will you use with the tcpdump command to display the contents of the packets?

Options:

A.

tcpdump -q

B.

tcpdump -v

C.

tcpdump -n

D.

tcpdump –A

Buy Now
Questions 71

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

History folder

B.

Download folder

C.

Cookies folder

D.

Temporary Internet Folder

Buy Now
Questions 72

Adam works as a professional Computer Hacking Forensic Investigator. He has been called by the FBI to examine data of the hard disk, which is seized from the house of a suspected terrorist.

Adam decided to acquire an image of the suspected hard drive. He uses a forensic hardware tool, which is capable of capturing data from IDE, Serial ATA, SCSI devices, and flash cards. This tool can also produce MD5 and CRC32 hash while capturing the data. Which of the following tools is Adam using?

Options:

A.

ImageMASSter Solo-3

B.

ImageMASSter 4002i

C.

FireWire DriveDock

D.

Wipe MASSter

Buy Now
Questions 73

Which of the following file systems is designed by Sun Microsystems?

Options:

A.

NTFS

B.

CIFS

C.

ZFS

D.

ext2

Buy Now
Questions 74

Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

Options:

A.

DriveSpy

B.

Ontrack

C.

Device Seizure

D.

Forensic Sorter

Buy Now
Questions 75

You work as a network administrator for Tech Perfect Inc. Rick, your assistant, requires information regarding his computer ' s IP address lease start date and expiry date. Which of the following commands will help him?

Options:

A.

Ipconfig /all

B.

Ping 127.0.0.1

C.

Ping /t

D.

Ipconfig /renew

Buy Now
Questions 76

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

Options:

A.

These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

B.

These are the threats that originate from within the organization.

C.

These are the threats intended to flood a network with large volumes of access requests.

D.

These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

Buy Now
Questions 77

Which of the following proxy servers can be used for spamming?

Options:

A.

Caching proxy server

B.

Web proxy server

C.

Open proxy server

D.

Anonymizing proxy server

Buy Now
Questions 78

Which of the following utilities allows to view all files including invisible files and folders on a Macintosh OS X?

Options:

A.

Directory Scan

B.

Folder Scan

C.

File Scan

D.

System Scan

Buy Now
Questions 79

How many bits does IPv6 use in IP addresses?

Options:

A.

40 bits

B.

32 bits

C.

64 bits

D.

128 bits

Buy Now
Questions 80

Which of the following statements are true about snort?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It develops a new signature to find vulnerabilities.

B.

It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS clients.

C.

It encrypts the log file using the 256 bit AES encryption scheme algorithm.

D.

It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connections.

Buy Now
Questions 81

Which of the following is NOT the primary type of firewall?

Options:

A.

Network firewall

B.

Proxy based firewall

C.

Stateful inspection firewall

D.

Packet filter firewall

Buy Now
Questions 82

You work as a Network Administrator for a bank. For securing the bank ' s network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network.

After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed. What type of response is the IDS giving?

Options:

A.

False Positive

B.

True Negative

C.

False Negative

D.

True Positive

Buy Now
Questions 83

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

Options:

A.

Public key

B.

Digital certificates

C.

Twofish

D.

RSA

Buy Now
Questions 84

Which of the following components are usually found in an Intrusion detection system (IDS) ?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Sensor

B.

Gateway

C.

Firewall

D.

Modem

E.

Console

Buy Now
Questions 85

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect ' s computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

Options:

A.

Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces

B.

Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces

C.

Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system

D.

Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

Buy Now
Questions 86

You work as a Network Administrator for TechPerfect Inc. The company has a corporate intranet setup. A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork. Which of the following steps will you take to accomplish the task?

Options:

A.

Block the ICMP protocol through ACL.

B.

Block the IPv6 protocol through ACL.

C.

Block the UDP protocol through ACL.

D.

Block the TCP protocol through ACL.

Buy Now
Questions 87

Which of the following standard file formats is used by Apple ' s iPod to store contact information?

Options:

A.

HFS+

B.

vCard

C.

FAT32

D.

hCard

Buy Now
Questions 88

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Options:

A.

PsExec

B.

PsList

C.

Fpipe

D.

Cain

Buy Now
Questions 89

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

Options:

A.

FAU

B.

FTK Imager

C.

Galleta

D.

Device Seizure

Buy Now
Questions 90

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

Options:

A.

Enable verbose logging on the firewall

B.

Install a network-based IDS

C.

Install a DMZ firewall

D.

Install a host-based IDS

Buy Now
Questions 91

Which of the following commands is a Packet sniffer?

Options:

A.

tcpdump

B.

strace

C.

nmap

D.

tail

Buy Now
Questions 92

Which of the following ports can be used for IP spoofing?

Options:

A.

NNTP 119

B.

POP 110

C.

Rlogin 513

D.

Whois 43

Buy Now
Questions 93

Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?

Options:

A.

alter dnsserver

B.

delete dnsserver

C.

disable dnsserver

D.

remove dnsserver

Buy Now
Questions 94

Which of the following DoS attacks points the Central Processing Unit (CPU) to a non-existent memory location causing the running process to end abruptly?

Options:

A.

Buffer Overflow attack

B.

Teardrop attack

C.

Fraggle attack

D.

Snork attack

Buy Now
Questions 95

Routers work at which layer of the OSI reference model?

Options:

A.

Transport

B.

Physical

C.

Presentation

D.

Network

Buy Now
Questions 96

Which of the following forensic tool suite is developed for Linux operating system?

Options:

A.

Wetstone

B.

MForensicsLab

C.

ProDiscover

D.

S.M.A.R.T.

Buy Now
Questions 97

Which of the following commands is used to flush the destination cache for IPv6 interface?

Options:

A.

netsh interface ipv6 reset cache

B.

netsh interface ipv6 delete destinationcache

C.

netsh interface ipv6 flush destinationcache

D.

netsh interface ipv6 remove destinationcache

Buy Now
Questions 98

In which of the following attacks does a hacker imitate a DNS server and obtain the entire DNS database?

Options:

A.

Illicit zone transfer attack

B.

DNS poisoning attack

C.

Illicit poisoning attack

D.

DNS transfer attack

Buy Now
Questions 99

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Options:

A.

Command injection attack

B.

Code injection attack

C.

Cross-Site Request Forgery

D.

Cross-Site Scripting attack

Buy Now
Questions 100

Which of the following techniques is used to log network traffic?

Options:

A.

Cracking

B.

IP address spoofing

C.

Tunneling

D.

Sniffing

Buy Now
Questions 101

What is the name of the group of blocks which contains information used by the operating system in Linux system?

Options:

A.

logblock

B.

Bootblock

C.

Superblock

D.

Systemblock

Buy Now
Questions 102

Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect ' s computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?

Options:

A.

Asterisk Logger

B.

Access PassView

C.

Mail Pass View

D.

MessenPass

Buy Now
Questions 103

Which of the following types of attacks uses ICMP to consume bandwidth and crash sites?

Options:

A.

MITM attack

B.

SYN flood attack

C.

TFN attack

D.

XSS attack

Buy Now
Questions 104

What is the maximum size of an IP datagram for Ethernet?

Options:

A.

1200 bytes

B.

1024 bytes

C.

1500 bytes

D.

4500 bytes

Buy Now
Questions 105

Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

All ideas present in the investigative report should flow logically from facts to conclusions.

B.

Opinion of a lay witness should be included in the investigative report.

C.

The investigative report should be understandable by any reader.

D.

There should not be any assumptions made about any facts while writing the investigative report.

Buy Now
Questions 106

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

Options:

A.

FAU

B.

FTK Imager

C.

Galleta

D.

Device Seizure

Buy Now
Questions 107

Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?

Options:

A.

Ntoskrnl.exe

B.

Advapi32.dll

C.

Kernel32.dll

D.

Win32k.sys

Buy Now
Questions 108

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Knowledge-based detection

B.

Protocol detection

C.

Statistical anomaly detection

D.

Pattern matching detection

Buy Now
Questions 109

Which of the following fields of the IPv6 header is similar to the TTL field of IPv4?

Options:

A.

Hop Limit

B.

Next Header

C.

Flow Label

D.

Traffic Class

Buy Now
Questions 110

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 domainbased network. Mark wants to block all NNTP traffic between the network and the Internet. How will he configure the network?

Options:

A.

Disable anonymous logins in the NNTP configuration manager.

B.

Block port 25 by configuring the firewall.

C.

Block port 119 by configuring the firewall.

D.

Block TCP port 80 by configuring the firewall.

Buy Now
Questions 111

Which of the following is an open-source Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software?

Options:

A.

Nmap

B.

Internet bot

C.

Dsniff

D.

Nikto

Buy Now
Questions 112

Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation?

Each correct answer represents a complete solution. Choose two.

Options:

A.

CRC

B.

HAVAL

C.

Twofish

D.

MD5

Buy Now
Questions 113

For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NTP

B.

HTTP/HTTPS

C.

DNS

D.

DHCP

Buy Now
Questions 114

Which of the following protocols is used to translate IP addresses to Ethernet addresses?

Options:

A.

Border Gateway Protocol (BGP)

B.

Routing Information Protocol (RIP)

C.

Address Resolution Protocol (ARP)

D.

Internet Control Message Protocol (ICMP)

Buy Now
Questions 115

Which of the following partitions contains the system files that are used to start the operating system?

Options:

A.

Boot partition

B.

System partition

C.

Secondary partition

D.

Primary partition

Buy Now
Questions 116

Which of the following DNS records is used for host name to IPv6 address resolution?

Options:

A.

PTR

B.

SOA

C.

A

D.

AAAA

E.

CNAME

Buy Now
Questions 117

Which of the following is an example of a firewall?

Options:

A.

ZoneAlarm

B.

PatriotBox

C.

Specter

D.

KFSensor

Buy Now
Questions 118

Which of the following Linux/UNIX commands is used to delete files permanently so that the files cannot be recovered?

Options:

A.

del

B.

shred

C.

erase

D.

rm

Buy Now
Questions 119

Which of the following distributes incorrect IP address to divert the traffic?

Options:

A.

IP spoofing

B.

Domain name server (DNS) poisoning

C.

Reverse Address Resolution Protocol

D.

Route table poisoning

Buy Now
Questions 120

Which of the following switches is used with Pslist command on the command line to show the statistics for all active threads on the system, grouping these threads with their owning process?

Options:

A.

Pslist -x

B.

Pslist -m

C.

Pslist -t

D.

Pslist -d

Buy Now
Questions 121

Which of the following networks relies on the tunneling protocol?

Options:

A.

Wide Area Network (WAN)

B.

Virtual Private Network (VPN)

C.

Local Area Network (LAN)

D.

Wireless Network

Buy Now
Questions 122

You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network.

You want to know the statistics of each protocol installed on your computer. Which of the following commands will you use?

Options:

A.

NBTSTAT -r

B.

NETSTAT -s

C.

NETSTAT -r

D.

NBTSTAT -s

Buy Now
Questions 123

Which of the following utilities is used for decrypting WEP encryption on an 802.11b network?

Options:

A.

Wireshark

B.

NetStumbler

C.

Airsnort

D.

Kismet

Buy Now
Questions 124

Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?

Options:

A.

Cache memory test failed

B.

Mother board timer not operational

C.

Display memory error

D.

Processor failure

Buy Now
Questions 125

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

Options:

A.

DOS boot disk

B.

EnCase with a hardware write blocker

C.

Linux Live CD

D.

Secure Authentication for EnCase (SAFE)

Buy Now
Questions 126

Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?

Options:

A.

Brute Force attack

B.

Hybrid attack

C.

Dictionary attack

D.

Rainbow attack

Buy Now
Questions 127

Which of the following monitors program activities and modifies malicious activities on a system?

Options:

A.

Back door

B.

RADIUS

C.

HIDS

D.

NIDS

Buy Now
Questions 128

You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer. While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command. What is the cause of the issue?

Options:

A.

Core Networking Firewall rules do not allow IPv4 or IPv6.

B.

Windows Firewall rules do not allow Core Networking Tools.

C.

Windows Firewall blocks the command line tools.

D.

Core Networking Firewall rules do not allow ICMPv4 or ICMPv6 Echo Requests.

Buy Now
Questions 129

Which of the following techniques allows the existence of both the Ipv6 and Ipv4 protocols in a device or network?

Options:

A.

Duplexing

B.

Dual stack

C.

Clustering

D.

Mirroring

Buy Now
Questions 130

Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?

Options:

A.

Display memory error

B.

Cache memory test failed

C.

Processor failure

D.

Mother board timer not operational

Buy Now
Questions 131

What are the limitations of the POP3 protocol?

Each correct answer represents a complete solution. Choose three.

Options:

A.

E-mails can be retrieved only from the Inbox folder of a mailbox. E-mails stored in any other folder are not accessible.

B.

It is only a retrieval protocol. It is designed to work with other applications that provide the ability to send e-mails.

C.

It does not support retrieval of encrypted e-mails.

D.

It uses less memory space.

Buy Now
Questions 132

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

Options:

A.

Frequency

B.

Delay

C.

Load

D.

Bandwidth

Buy Now
Questions 133

Which of the following statements is NOT true about FAT16 file system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

FAT16 file system supports Linux operating system.

B.

FAT16 file system supports file-level compression.

C.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.

D.

FAT16 does not support file-level security.

Buy Now
Questions 134

Which of the following is a valid IPv6 address?

Options:

A.

45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE

B.

45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE

C.

123.111.243.123

D.

45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

Buy Now
Questions 135

Which of the following is the default port for Hypertext Transfer Protocol (HTTP)?

Options:

A.

23

B.

21

C.

80

D.

25

Buy Now
Questions 136

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Slack space

B.

Dumb space

C.

Hidden partition

D.

Unused Sectors

Buy Now
Questions 137

You work as a Network Administrator for McRobert Inc. You plan to configure your Windows Vista computer for Internet access. To achieve this, which of the following communication protocols needs to be bound to the dial-up adapter?

Options:

A.

TCP/IP

B.

DLC

C.

NetBEUI

D.

AppleTalk

Buy Now
Questions 138

Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with a project to investigate a computer in the network of SecureEnet Inc. The compromised system runs on Windows operating system. Adam decides to use Helix Live for Windows to gather data and electronic evidences starting with retrieving volatile data and transferring it to server component via TCP/IP. Which of the following application software in Helix Windows Live will he use to retrieve volatile data and transfer it to the server component via TCP/IP?

Options:

A.

FAU

B.

FTK imager

C.

Drive Manager

D.

FSP

Buy Now
Questions 139

Which of the following is the default port for TACACS ?

Options:

A.

UDP port 49

B.

TCP port 80

C.

TCP port 25

D.

TCP port 443

Buy Now
Questions 140

Which of the following units of data does the data-link layer send from the network layer to the physical layer of the OSI model ?

Options:

A.

Protocols

B.

Raw bits

C.

Data packets

D.

Data frames

E.

Data segments

Buy Now
Questions 141

You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You want to get the protocol statistics and the active TCP/IP network connections of your computer. Which of the following will you use?

Options:

A.

IPSTAT

B.

SNMP

C.

ARP

D.

NBTSTAT

E.

NETSTAT

Buy Now
Questions 142

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Unicast

B.

Multicast

C.

Broadcast

D.

Anycast

Buy Now
Questions 143

Fill in the blank with the appropriate term.

___________ is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.

Options:

Buy Now
Questions 144

Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He is working on a case of a cyber crime. Peter knows that the good investigative report should not only communicate the relevant facts, but also present expert opinion. This report should not include the cases in which the expert acted as a lay witness. Which of the following type of witnesses is a lay witness?

Options:

A.

One who can give a firsthand account of something seen, heard, or experienced.

B.

One with special knowledge of the subject about which he or she is testifying.

C.

One who observes an event.

D.

One who is not qualified as an expert witness.

Buy Now
Questions 145

You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer ' s log:

45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72

Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?

Options:

A.

41, UDP

B.

16, ICMP

C.

41, TCP

D.

16, UDP

Buy Now
Questions 146

Which of the following is the process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks?

Options:

A.

Alarm filtering

B.

Confidence value

C.

Reactive system

D.

Site policy

Buy Now
Questions 147

Which of the following statements about FTP is true?

Options:

A.

It holds files transmitted through POP3 mail.

B.

It manages network devices.

C.

It connects file servers on the World Wide Web.

D.

It transfers files between computers.

E.

It allows password free file transfers.

Buy Now
Questions 148

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

Options:

A.

Hunt

B.

Alchemy Remote Executor

C.

Mendax

D.

Ettercap

Buy Now
Questions 149

Maria works as the Chief Security Officer for passguide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides ' security through obscurity ' . What technique is Maria using?

Options:

A.

Encryption

B.

Public-key cryptography

C.

Steganography

D.

RSA algorithm

Buy Now
Questions 150

Web applications are accessed by communicating over TCP ports via an IP address. Choose the two most common Web Application TCP ports and their respective protocol names.

Each correct answer represents a complete solution. Choose two.

Options:

A.

TCP Port 443 / S-HTTP or SSL

B.

TCP Port 443 / HTTPS or SSL

C.

TCP Port 80 / HTTP

D.

TCP Port 80 / HTTPS or SSL

Buy Now
Questions 151

You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline. This type of IDS is called __________.

Options:

A.

Anomaly Based

B.

Reactive IDS

C.

Passive IDS

D.

Signature Based

Buy Now
Questions 152

Adam, an expert computer user, doubts that virus named love.exe has attacked his computer. This virus acquires hidden and read-only attributes, so it is difficult to delete it. Adam decides to delete virus file love.exe from the command line. He wants to use del command for this purpose. Which of the following switches will he use with del command to delete hidden and read only-files?

Options:

A.

del /f /ah

B.

del /q /ar

C.

del /p /ar

D.

del /q

Buy Now
Exam Code: GCIA
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Apr 30, 2026
Questions: 508

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now GCIA testing engine

PDF (Q&A)

$43.57  $124.49
buy now GCIA pdf