Pass the GIAC Security Administration GCIA Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-15 out of questions
Questions # 1:

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes.

On the basis of above information, which of the following types of attack is Adam attempting to perform?

Options:

A.

Fraggle attack


B.

SYN Flood attack


C.

Land attack


D.

Ping of death attack


Questions # 2:

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate computer of an unfaithful employee of SecureEnet Inc. Suspect's computer runs on Windows operating system. Which of the following sources will Adam investigate on a Windows host to collect the electronic evidences?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Allocated cluster


B.

Swap files


C.

Slack spaces


D.

Unused and hidden partition


Questions # 3:

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You want to know the current TCP/IP network configuration settings, DHCP server IP address, and DHCP lease expiration date of your network.

Which of the following utilities will you use?

Options:

A.

PING


B.

TELNET


C.

TRACERT


D.

IPCONFIG


Questions # 4:

Which of the following OSI layers is responsible for protocol conversion, data encryption/decryption, and data compression?

Options:

A.

Network layer


B.

Data-link layer


C.

Presentation layer


D.

Transport layer


Questions # 5:

Which of the following is the default port for TACACS?

Options:

A.

UDP port 49


B.

TCP port 80


C.

TCP port 25


D.

TCP port 443


Questions # 6:

You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Event logs


B.

Program logs


C.

Web server logs


D.

System logs


Questions # 7:

You work as a network administrator for BlueWell Inc. You have to convert your 48-bit host address (MAC address) to an IPv6 54-bit address. Using the IEEE-EUI-64 conversion process, how do you convert the 48-bit host address (MAC address) to an IPv6 54-bit address?

Options:

A.

Add EF. FE between the third and fourth bytes.


B.

Add FE. EE between the third and fourth bytes.


C.

Add FF. EE between the third and fourth bytes.


D.

Add FF. FE between the third and fourth bytes


Questions # 8:

Which of the following is used to detect the bad sectors in a hard disk under Linux environment?

Options:

A.

Badblocks


B.

CheckDisk


C.

ScanDisk


D.

CHKDSK


Questions # 9:

Which of the following statements best describes the string matching method of signature analysis?

Options:

A.

String matching searches specific strings that may indicate an attack.


B.

String matching examines multiple fields from different protocols, such as source address, destination port, or TCP flags.


C.

In string matching, each packet is wrapped in predefined layers of different protocols.


D.

In string matching, an incoming packet is compared, byte by byte, with a single signature, a string of code.


Questions # 10:

Which of the following utilities can generate a local static route table?

Each correct answer represents a complete solution. Choose two.

Options:

A.

ROUTE


B.

PING


C.

NETSTAT


D.

TRACERT


E.

NBTSTAT


Questions # 11:

Rick works as the Network Administrator of Baby Blue Inc. He wants to upgrade the existing network to the Active Directory based Windows 2000 network.

He configures a DNS on the network. Which of the following is the primary reason that the DNS is required in an Active Directory environment?

Options:

A.

Without installing the DNS, you cannot install the Active Directory in the network.


B.

Netlogon uses the DNS to find a domain controller in the network.


C.

The Active Directory uses the DNS zone transfer protocol during replication.


D.

The Active Directory is stored within the DNS database.


Questions # 12:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Question # 12

Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

PsPasswd


B.

AirSnort


C.

Cain


D.

Kismet


Questions # 13:

Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a remote location and a public IPv4 address, instead of public IPv6 address, has been assigned to the computer?

Options:

A.

ISATAP


B.

PortProxy


C.

6to4


D.

Teredo


Questions # 14:

The National Shoes Inc. has an SNMP enabled router installed on its network. IT Manager wants to monitor all SNMP traffic generated by the router. So, he installs a Network Monitor on a Windows2000 Server computer on the network. The router is configured to send traps to an SNMP manager installed on another server. He wants to get a notification whenever the network router raises an SNMP trap. What will he do to achieve this?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Install an SNMP manager on the router.


B.

Start the Windows 2000 Alert Service on the server.


C.

Create a TCP/IP filter on the server.


D.

Create a Network Monitor filter that has a pattern match for SNMP traffic.


E.

Create a Network Monitor trigger to run the NET SEND command.


F.

Configure the network router to trap the IP address of the server.


Questions # 15:

Adam works on a Linux system. He is using Sendmail as the primary application to transmit e-mails.

Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

Options:

A.

/log/var/mailog


B.

/var/log/logmail


C.

/var/log/mailog


D.

/log/var/logd


Viewing page 1 out of 11 pages
Viewing questions 1-15 out of questions