Pass the GIAC Security Administration GCIA Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions
Questions # 31:

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate Plagiarism occurred in the source code files of C#. Which of the following tools will you use to detect the software plagiarism?

Options:

A.

VAST


B.

Jplag


C.

SCAM


D.

Turnitin


Expert Solution
Questions # 32:

An attacker wants to launch an attack on a wired Ethernet. He wants to accomplish the following tasks:

Sniff data frames on a local area network.

Modify the network traffic.

Stop the network traffic frequently.

Which of the following techniques will the attacker use to accomplish the task?

Options:

A.

IP spoofing


B.

Eavesdropping


C.

ARP spoofing


D.

Session hijacking


Expert Solution
Questions # 33:

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following Steganography methods is Victor using to accomplish the task?

Options:

A.

The distortion technique


B.

The spread spectrum technique


C.

The cover generation technique


D.

The substitution technique


Expert Solution
Questions # 34:

Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.

Which of the following protocols does the DCC use?

Options:

A.

TCP


B.

TELNET


C.

ICMP


D.

UDP


Expert Solution
Questions # 35:

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be the most help against Denial of Service (DOS) attacks?

Options:

A.

Network surveys.


B.

Honey pot


C.

Packet filtering firewall


D.

Stateful Packet Inspection (SPI) firewall


Expert Solution
Questions # 36:

Which of the following utilities provides information as per the format given below?

Question # 36

Options:

A.

TRACERT


B.

NBTSTAT


C.

NETSTAT


D.

PING


Expert Solution
Questions # 37:

You are planning DNS configuration for your company. You decide to configure an Active Directory integrated DNS.

Which of the following are the benefits of Active Directory integrated DNS configuration?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Replication is more efficient.


B.

Multi-master environments are more fault tolerant.


C.

Single-master environment is simpler to administer.


D.

It results in enhanced security.


Expert Solution
Questions # 38:

You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline. This type of IDS is called __________.

Options:

A.

Anomaly Based


B.

Reactive IDS


C.

Passive IDS


D.

Signature Based


Expert Solution
Questions # 39:

Which of the following types of attacks uses ICMP to consume bandwidth and crash sites?

Options:

A.

MITM attack


B.

SYN flood attack


C.

TFN attack


D.

XSS attack


Expert Solution
Questions # 40:

What is the name of the group of blocks which contains information used by the operating system in Linux system?

Options:

A.

logblock


B.

Bootblock


C.

Superblock


D.

Systemblock


Expert Solution
Questions # 41:

Which of the following attacks is used to hack simple alphabetical passwords?

Options:

A.

Dictionary-based attack


B.

Sniffing


C.

Man-in-the-middle attack


D.

Black hat attack


Expert Solution
Questions # 42:

Which of the following ports can be used for IP spoofing?

Options:

A.

NNTP 119


B.

POP 110


C.

Rlogin 513


D.

Whois 43


Expert Solution
Questions # 43:

Which of the following attacks is designed to deduce the brand and/or version of an operating system or application?

Options:

A.

Vulnerability assessment


B.

Banner grabbing


C.

OS fingerprinting


D.

Port scanning


Expert Solution
Questions # 44:

Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

Options:

A.

Logical control and Link control


B.

Data control and Media Access control


C.

Machine Link control and Logical Link control


D.

Logical Link control and Media Access control


Expert Solution
Questions # 45:

What is the maximum size of an IP datagram for Ethernet?

Options:

A.

1200 bytes


B.

1024 bytes


C.

1500 bytes


D.

4500 bytes


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions