Pass the GIAC Security Administration GCIA Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions
Questions # 61:

Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

Options:

A.

Data control and Media Access control


B.

Logical control and Link control


C.

Logical Link control and Media Access control


D.

Machine Link control and Logical Link control


Expert Solution
Questions # 62:

Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?

Options:

A.

Dialler attack


B.

Denial of service


C.

Eavesdropping


D.

Intrusion


Expert Solution
Questions # 63:

Which of the following is not a Denial of Service (DoS) attack?

Options:

A.

Smurf attack


B.

Code injection attack


C.

Ping of Death attack


D.

Teardrop attack


Expert Solution
Questions # 64:

In which of the following attacks does a hacker imitate a DNS server and obtain the entire DNS database?

Options:

A.

Illicit zone transfer attack


B.

DNS poisoning attack


C.

Illicit poisoning attack


D.

DNS transfer attack


Expert Solution
Questions # 65:

What is the process of detecting unauthorized access known as?

Options:

A.

Intrusion detection


B.

Misuse detection


C.

Anomaly detection


D.

Integrity detection


Expert Solution
Questions # 66:

Which of the following statements are true about an IPv6 network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.


B.

It increases the number of available IP addresses.


C.

It provides improved authentication and security.


D.

It uses 128-bit addresses.


E.

It uses longer subnet masks than those used in IPv4.


Expert Solution
Questions # 67:

Which of the following can be applied as countermeasures against DDoS attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Limiting the amount of network bandwidth


B.

Blocking IP address


C.

Using LM hashes for passwords


D.

Using Intrusion detection systems


E.

Using the network-ingress filtering


Expert Solution
Questions # 68:

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

Options:

A.

These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.


B.

These are the threats that originate from within the organization.


C.

These are the threats intended to flood a network with large volumes of access requests.


D.

These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.


Expert Solution
Questions # 69:

Which of the following ports is used for DNS services?

Options:

A.

Port 7


B.

Port 53


C.

Port 80


D.

Port 23


Expert Solution
Questions # 70:

Which of the following is NOT an Intrusion Detection System?

Options:

A.

Fragroute


B.

Stunnel


C.

Samhain


D.

AIDE


Expert Solution
Questions # 71:

Which of the following utilities allows to view all files including invisible files and folders on a Macintosh OS X?

Options:

A.

Directory Scan


B.

Folder Scan


C.

File Scan


D.

System Scan


Expert Solution
Questions # 72:

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Knowledge-based detection


B.

Protocol detection


C.

Statistical anomaly detection


D.

Pattern matching detection


Expert Solution
Questions # 73:

Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?

Options:

A.

Ntoskrnl.exe


B.

Advapi32.dll


C.

Kernel32.dll


D.

Win32k.sys


Expert Solution
Questions # 74:

What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

Options:

A.

Sircam


B.

Stoner


C.

Code Red


D.

Brain


Expert Solution
Questions # 75:

How many bits does IPv6 use in IP addresses?

Options:

A.

40 bits


B.

32 bits


C.

64 bits


D.

128 bits


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions