Pass the GIAC Security Administration GCIA Questions and answers with CertsForce

Viewing page 10 out of 11 pages
Viewing questions 136-150 out of questions
Questions # 136:

Adam works as a professional Computer Hacking Forensic Investigator. He has been called by the FBI to examine data of the hard disk, which is seized from the house of a suspected terrorist.

Adam decided to acquire an image of the suspected hard drive. He uses a forensic hardware tool, which is capable of capturing data from IDE, Serial ATA, SCSI devices, and flash cards. This tool can also produce MD5 and CRC32 hash while capturing the data. Which of the following tools is Adam using?

Options:

A.

ImageMASSter Solo-3


B.

ImageMASSter 4002i


C.

FireWire DriveDock


D.

Wipe MASSter


Expert Solution
Questions # 137:

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Names of the victims


B.

Date and time of incident


C.

Nature of harassment


D.

Location of each incident


Expert Solution
Questions # 138:

Which of the following command-line utilities is used to show the state of current TCP/IP connections?

Options:

A.

PING


B.

TRACERT


C.

NETSTAT


D.

NSLOOKUP


Expert Solution
Questions # 139:

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone. Which of the following commands will you use to accomplish the task?

Options:

A.

Dnscmd /config /enableglobalnames 1


B.

Dnscmd /config /enableglobalnamessupport 0


C.

Dnscmd /config /enableglobalnamessupport 1


D.

Dnscmd /config /globalnamesqueryorder 0


Expert Solution
Questions # 140:

Which of the following is a signature-based intrusion detection system (IDS) ?

Options:

A.

Snort


B.

StealthWatch


C.

RealSecure


D.

Tripwire


Expert Solution
Questions # 141:

You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You have configured a WAN link for the network. You are facing connectivity problem across the WAN link. What will be your first step in troubleshooting the issue?

Options:

A.

Reinstall TCP/IP protocol.


B.

Check that the correct default gateway is set.


C.

Enable DNS.


D.

Ensure that NetBEUI protocol is loaded.


E.

Use the NETSTAT utility to view TCP/IP statistics.


Expert Solution
Questions # 142:

Which of the following are default ports for the FTP service?

Each correct answer represents a complete solution. Choose two.

Options:

A.

80


B.

21


C.

20


D.

443


Expert Solution
Questions # 143:

Which of the following work as traffic monitoring tools in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

MRTG


B.

John the Ripper


C.

IPTraf


D.

Ntop


Expert Solution
Questions # 144:

You work as a system administrator for BlueSkwer.com. You are using IPv6 on all computers. You want to ensure that you do not need to manually configure the IPv6 addresses. You want to take advantage of the router discovery features. For router discovery to work properly, what is needed?

Options:

A.

A properly configured IPv6 router


B.

Network load balancers


C.

CAT 6 cables


D.

Internet Explorer 8


Expert Solution
Questions # 145:

Which of the following attacks involves multiple compromised systems to attack a single target?

Options:

A.

Brute force attack


B.

DDoS attack


C.

Replay attack


D.

Dictionary attack


Expert Solution
Questions # 146:

Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

Options:

A.

Unicast


B.

Anycast


C.

Loopback


D.

Multicast


Expert Solution
Questions # 147:

Which of the following statements about a host-based intrusion prevention system (HIPS) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It can detect events scattered over the network.


B.

It can handle encrypted and unencrypted traffic equally.


C.

It cannot detect events scattered over the network.


D.

It is a technique that allows multiple computers to share one or more IP addresses.


Expert Solution
Questions # 148:

Which of the following password cracking tools can work on the Unix and Linux environment?

Options:

A.

Brutus


B.

John the Ripper


C.

Cain and Abel


D.

Ophcrack


Expert Solution
Questions # 149:

Which of the following is the default port for Simple Network Management Protocol (SNMP)?

Options:

A.

TCP port 110


B.

TCP port 25


C.

TCP port 80


D.

UDP port 161


Expert Solution
Questions # 150:

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

History folder


B.

Download folder


C.

Cookies folder


D.

Temporary Internet Folder


Expert Solution
Viewing page 10 out of 11 pages
Viewing questions 136-150 out of questions