Pass the GIAC Security Administration GCIA Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
Questions # 76:

Routers work at which layer of the OSI reference model?

Options:

A.

Transport


B.

Physical


C.

Presentation


D.

Network


Expert Solution
Questions # 77:

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

Options:

A.

LIDS


B.

Dsniff


C.

Cain


D.

Libnids


Expert Solution
Questions # 78:

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 domainbased network. Mark wants to block all NNTP traffic between the network and the Internet. How will he configure the network?

Options:

A.

Disable anonymous logins in the NNTP configuration manager.


B.

Block port 25 by configuring the firewall.


C.

Block port 119 by configuring the firewall.


D.

Block TCP port 80 by configuring the firewall.


Expert Solution
Questions # 79:

You work as a Network Administrator for Net Perfect Inc. The company's network is configured with Internet Security and Acceleration (ISA) Server 2000 to provide firewall services. You want to block all e-mails coming from the domain named fun4you.com. How will you accomplish this?

Options:

A.

Enable POP intrusion detection filter

Block e-mails from the fun4you.com domain


B.

Enable SMTP filter

Add the fun4you.com domain name to the list of rejected domains


C.

Create a site and content rule to prohibit access to the fun4you.com domain


D.

Create a protocol rule that allows only authorized users to use the SMTP protocol


Expert Solution
Questions # 80:

John works as a Network Administrator for Samtech Inc. He has configured CDP on each interface of the router. Which of the following commands should he use to list the number of CDP advertisements?

Options:

A.

show interfaces [type number]


B.

show cdp traffic


C.

show interfaces status


D.

show cdp


Expert Solution
Questions # 81:

Which of the following ports is used by NTP for communication?

Options:

A.

143


B.

123


C.

161


D.

53


Expert Solution
Questions # 82:

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

Options:

A.

Spoofing


B.

Sending deceptive e-mails


C.

Network Configuration Changes


D.

Shunning


E.

Logging


F.

Sending notifications


Expert Solution
Questions # 83:

Which of the following Windows Registry key contains the password file of the user?

Options:

A.

HKEY_USER


B.

HKEY_DYN_DATA


C.

HKEY_LOCAL_MACHINE


D.

HKEY_CURRENT_CONFIG


Expert Solution
Questions # 84:

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

Options:

A.

DOS boot disk


B.

EnCase with a hardware write blocker


C.

Linux Live CD


D.

Secure Authentication for EnCase (SAFE)


Expert Solution
Questions # 85:

What is the maximum size of an IP datagram for Ethernet?

Options:

A.

4500 bytes


B.

1024 bytes


C.

1200 bytes


D.

1500 bytes


Expert Solution
Questions # 86:

Where is the Hypertext Transfer Protocol (HTTP) used?

Options:

A.

On a client/server-based Wide Area Network (WAN).


B.

On the Internet to download text files and graphic files.


C.

On a peer-to-peer based Local Area Network (LAN).


D.

On the World Wide Web (WWW) to display SQL database statistics.


E.

On the World Wide Web (WWW) to display Hypertext Markup Language (HTML) pages.


Expert Solution
Questions # 87:

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SARA


B.

Snort


C.

Samhain


D.

Tripwire


Expert Solution
Questions # 88:

Which of the following information must the fragments carry for the destination host to reassemble them back to the original unfragmented state?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

MF flag


B.

Offset field


C.

MAC address


D.

Length of the data


E.

IP address


F.

IP identification number


Expert Solution
Questions # 89:

Which of the following commands used in Linux to create bit-stream images?

Options:

A.

ss


B.

xcopy


C.

dd


D.

img


Expert Solution
Questions # 90:

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer?

Options:

A.

Swatch


B.

IPLog


C.

Timbersee


D.

Snort


Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions