Pass the GIAC Security Administration GCIA Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions
Questions # 106:

At which port does a DHCPv6 client listen for DHCP messages?

Options:

A.

TCP port 546


B.

TCP port 547


C.

UDP port 546


D.

UDP port 547


Expert Solution
Questions # 107:

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.

Which of the following DoS attacks is Maria using to accomplish her task?

Options:

A.

Smurf DoS attack


B.

Fraggle DoS attack


C.

Ping flood attack


D.

Teardrop attack


Expert Solution
Questions # 108:

Which of the following partitions contains the system files that are used to start the operating system?

Options:

A.

Boot partition


B.

System partition


C.

Secondary partition


D.

Primary partition


Expert Solution
Questions # 109:

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You configure intrusion detection on the server. Which of the following alerts notifies that repeated attempts to a destination computer are being made and no corresponding ACK (acknowledge) packet is being communicated?

Options:

A.

IP half scan attack


B.

UDP bomb attack


C.

Land attack


D.

Ping of death attack


Expert Solution
Questions # 110:

Which of the following IP packet elements is responsible for authentication while using IPSec?

Options:

A.

Internet Key Exchange (IKE)


B.

Authentication Header (AH)


C.

Layer 2 Tunneling Protocol (L2TP)


D.

Encapsulating Security Payload (ESP)


Expert Solution
Questions # 111:

What netsh command should be run to enable IPv6 routing?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

netsh interface IPv6 show interface


B.

netsh interface IPv6 add routes


C.

netsh interface IPv6 set interface


D.

netsh interface IPv6 add address


Expert Solution
Questions # 112:

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

Options:

A.

Neighbor Solicitation


B.

Router Solicitation


C.

Neighbor Advertisement


D.

Router Advertisement


Expert Solution
Questions # 113:

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

Options:

A.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer


B.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer


C.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer


D.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer


Expert Solution
Questions # 114:

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Zero-day attack


B.

Dictionary-based attack


C.

Rainbow attack


D.

Denial-of-service (DoS) attack


E.

Brute force attack


F.

Buffer-overflow attack


G.

Password guessing


Expert Solution
Questions # 115:

Which of the following applications cannot proactively detect anomalies related to a computer?

Options:

A.

NIDS


B.

Firewall installed on the computer


C.

HIDS


D.

Anti-virus scanner


Expert Solution
Questions # 116:

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

Options:

A.

Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces


B.

Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces


C.

Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system


D.

Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps


Expert Solution
Questions # 117:

Fill in the blank with the appropriate term.

___________is the practice of monitoring and potentially restricting the flow of information outbound from one network to another


Expert Solution
Questions # 118:

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

Options:

A.

Public key


B.

Digital certificates


C.

Twofish


D.

RSA


Expert Solution
Questions # 119:

Which of the following conclusions can be drawn from viewing the given output generated by the PING command-line utility?

Question # 119

Options:

A.

The network bandwidth is heavily utilized.


B.

The IP address of the destination computer is not resolved.


C.

There is no connectivity between the source and the destination computer.


D.

The hub is not working.


Expert Solution
Questions # 120:

Which of the following is known as a message digest?

Options:

A.

Hash function


B.

Hashing algorithm


C.

Spider


D.

Message authentication code


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions