Pass the GIAC Security Administration GCIA Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following partitions contains the system files that are used to start the operating system?

Options:

A.

Secondary partition


B.

Boot partition


C.

Primary partition


D.

System partition


Expert Solution
Questions # 47:

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used.

He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about programs like Hping2 that can get into a network through covert channels.

Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?

Options:

A.

Block ICMP type 13 messages


B.

Block all outgoing traffic on port 21


C.

Block all outgoing traffic on port 53


D.

Block ICMP type 3 messages


Expert Solution
Questions # 48:

Which of the following proxy servers can be used for spamming?

Options:

A.

Caching proxy server


B.

Web proxy server


C.

Open proxy server


D.

Anonymizing proxy server


Expert Solution
Questions # 49:

Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?

Options:

A.

disable dnsserver


B.

alter dnsserver


C.

delete dnsserver


D.

remove dnsserver


Expert Solution
Questions # 50:

Which of the following commands is a Packet sniffer?

Options:

A.

tcpdump


B.

strace


C.

nmap


D.

tail


Expert Solution
Questions # 51:

Which of the following forensic tool suite is developed for Linux operating system?

Options:

A.

Wetstone


B.

MForensicsLab


C.

ProDiscover


D.

S.M.A.R.T.


Expert Solution
Questions # 52:

Which of the following firewalls depends on the three-way handshake of the TCP protocol?

Options:

A.

Stateful firewall


B.

Endian firewall


C.

Proxy-based firewall


D.

Packet filter firewall


Expert Solution
Questions # 53:

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

Options:

A.

Dsniff


B.

Snort


C.

Nikto


D.

Sniffer


Expert Solution
Questions # 54:

Which of the following techniques is used to log network traffic?

Options:

A.

Cracking


B.

IP address spoofing


C.

Tunneling


D.

Sniffing


Expert Solution
Questions # 55:

Which of the following file systems is designed by Sun Microsystems?

Options:

A.

NTFS


B.

CIFS


C.

ZFS


D.

ext2


Expert Solution
Questions # 56:

Which of the following is NOT the primary type of firewall?

Options:

A.

Network firewall


B.

Proxy based firewall


C.

Stateful inspection firewall


D.

Packet filter firewall


Expert Solution
Questions # 57:

Which of the following DNS resource records is used to resolve a host name to an IPv6 address?

Options:

A.

AAAA


B.

HINFO


C.

CNAME


D.

A


Expert Solution
Questions # 58:

Which of the following types of Intrusion detection systems (IDS) is used for port mirroring?

Options:

A.

Port address-based IDS


B.

Network-based IDS (NIDS)


C.

Host-based IDS (HIDS)


D.

Anomaly-based IDS


Expert Solution
Questions # 59:

Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

All ideas present in the investigative report should flow logically from facts to conclusions.


B.

Opinion of a lay witness should be included in the investigative report.


C.

The investigative report should be understandable by any reader.


D.

There should not be any assumptions made about any facts while writing the investigative report.


Expert Solution
Questions # 60:

You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

Options:

A.

Site-local


B.

Global unicast


C.

Local-link


D.

Loopback


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions