Pass the GIAC Security Administration GCIA Questions and answers with CertsForce

Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions
Questions # 16:

You work as a Network Administrator in a company. The NIDS is implemented on the network.

You want to monitor network traffic. Which of the following modes will you configure on the network interface card to accomplish the task?

Options:

A.

Promiscuous


B.

Audit mode


C.

Full Duplex


D.

Half duplex


Expert Solution
Questions # 17:

Who are the primary victims of smurf attacks on the contemporary Internet system?

Options:

A.

FTP servers are the primary victim to smurf attacks


B.

IRC servers are the primary victim to smurf attacks


C.

SMTP servers are the primary victim to smurf attacks


D.

Mail servers are the primary victim to smurf attacks


Expert Solution
Questions # 18:

Which of the following utilities is used to display the current TCP/IP configuration of a Windows NT computer?

Options:

A.

NBTSTAT


B.

IPCONFIG


C.

CONFIG.SYS


D.

FTP


Expert Solution
Questions # 19:

Which of the following IPv4 to IPv6 transition methods uses encapsulation of IPv6 packets to traverse IPv4 networks?

Options:

A.

Dual-stack


B.

Translation


C.

Tunneling


D.

Stack


Expert Solution
Questions # 20:

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Unicast


B.

Multicast


C.

Broadcast


D.

Anycast


Expert Solution
Questions # 21:

Which of the following Linux file systems is a journaled file system?

Options:

A.

ext3


B.

ext4


C.

ext2


D.

ext


Expert Solution
Questions # 22:

Adam works as a Network Administrator for passguide Inc. He wants to prevent the network from

DOS attacks. Which of the following is most useful against DOS attacks?

Options:

A.

Internet bot


B.

Honey Pot


C.

SPI


D.

Distributive firewall


Expert Solution
Questions # 23:

Which of the following is used as a default port by the TELNET utility?

Options:

A.

21


B.

80


C.

23


D.

20


Expert Solution
Questions # 24:

Which of the following is a valid IPv6 address?

Options:

A.

45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE


B.

45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE


C.

123.111.243.123


D.

45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE


Expert Solution
Questions # 25:

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system. Which of the following files will Adam investigate to accomplish the task?

Options:

A.

/boot/grub/menu.lst


B.

/grub/grub.com


C.

/boot/boot.conf


D.

/boot/grub/grub.conf


Expert Solution
Questions # 26:

You work as a network administrator for Tech Perfect Inc. Rick, your assistant, requires information regarding his computer's IP address lease start date and expiry date. Which of the following commands will help him?

Options:

A.

Ipconfig /all


B.

Ping 127.0.0.1


C.

Ping /t


D.

Ipconfig /renew


Expert Solution
Questions # 27:

Which of the following is an example of penetration testing?

Options:

A.

Implementing HIDS on a computer


B.

Simulating an actual attack on a network


C.

Implementing NIDS on a network


D.

Configuring firewall to block unauthorized traffic


Expert Solution
Questions # 28:

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.

Signature-based


B.

Network-based


C.

File-based


D.

Anomaly-based


Expert Solution
Questions # 29:

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate and examine drive image of a compromised system, which is suspected to be used in cyber crime. Adam uses Forensic Sorter to sort the contents of hard drive in different categories. Which of the following type of image formats is NOT supported by Forensic Sorter?

Options:

A.

EnCase image file


B.

PFR image file


C.

RAW image file


D.

iso image file


Expert Solution
Questions # 30:

What is the order of the extension headers that is followed by IPv6?

Options:

A.

Destination Options (first), Routing, IPv6 header, Hop-by-Hop, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.


B.

Routing, Hop-by-Hop, Destination Options (first), Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.


C.

Fragment, Routing, Hop-by-Hop, Destination Options (first), Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.


D.

IPv6 header, Hop-by-Hop, Destination Options (first), Routing, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.


Expert Solution
Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions