Pass the GIAC Security Administration GCIA Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions
Questions # 121:

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

Options:

A.

A3-07-B9-E3-BC-F9


B.

132.298.1.23


C.

F936.28A1.5BCD.DEFA


D.

1011-0011-1010-1110-1100-0001


Expert Solution
Questions # 122:

Which of the following terms is used to represent IPv6 addresses?

Options:

A.

Colon-dot


B.

Colon-hexadecimal


C.

Hexadecimal-dot notation


D.

Dot notation


Expert Solution
Questions # 123:

Which of the following statements are true about an IPv6 network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.


B.

It increases the number of available IP addresses.


C.

It provides improved authentication and security.


D.

It uses 128-bit addresses.


E.

It uses longer subnet masks than those used in IPv4.


Expert Solution
Questions # 124:

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

Options:

A.

Dsniff


B.

Snort


C.

Nikto


D.

Sniffer


Expert Solution
Questions # 125:

For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

DNS


B.

HTTP/HTTPS


C.

DHCP


D.

NTP


Expert Solution
Questions # 126:

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.

Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

Options:

A.

Anamoly-based detection


B.

Policy-based detection


C.

Honey pot detection


D.

Signature-based detection


Expert Solution
Questions # 127:

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

Options:

A.

Man trap


B.

Network Intrusion Detection System (NIDS)


C.

Biometric device


D.

Host Intrusion Detection System (HIDS)


Expert Solution
Questions # 128:

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Tcpdump


B.

Ettercap


C.

Mendax


D.

Fragroute


Expert Solution
Questions # 129:

Which of the following is the difference between SSL and S-HTTP?

Options:

A.

SSL operates at the network layer and S-HTTP operates at the application layer.


B.

SSL operates at the transport layer and S-HTTP operates at the application layer.


C.

SSL operates at the application layer and S-HTTP operates at the transport layer.


D.

SSL operates at the application layer and S-HTTP operates at the network layer.


Expert Solution
Questions # 130:

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

Options:

A.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer


B.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer


C.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer


D.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer


Expert Solution
Questions # 131:

Which of the following log files are used to collect evidences before taking the bit-stream image of the BlackBerry?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

user history


B.

Transmit/Receive


C.

Radio status


D.

Roam and Radio


Expert Solution
Questions # 132:

Which of the following UDP ports are used by the Simple Network Management Protocol (SNMP)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

UDP port 69


B.

UDP port 161


C.

UDP port 137


D.

UDP port 162


Expert Solution
Questions # 133:

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses. Which of the following worms has attacked the computer?

Options:

A.

Ramen


B.

LoveLetter


C.

Code red


D.

Nimda


Expert Solution
Questions # 134:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has written the following snort signature:

Question # 134

Which of the following statements about this snort signature is true?

Options:

A.

It detects the session splicing IDS evasion attack.


B.

It detects AOL IM chat.


C.

It detects Yahoo IM chat.


D.

It detects the bad file attachments coming to the mail server.


Expert Solution
Questions # 135:

Mark works as the Network Administrator of a Windows 2000 based network. The network has a DNS server installed. He experiences host name resolution problems on the network. In order to rectify the situation, he wants to troubleshoot DNS name resolution problems on the network.

Which of the following tools will he use to do this?

Options:

A.

NSLOOKUP


B.

IPCONFIG


C.

NBTSTAT


D.

NETSTAT


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions