Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

GIAC GCIA Exam - Cheat-Test.com

Free GCIA Sample Questions:

Q: 1
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The servers on the network run Windows Server 2008 R2. All client computers on the network run Windows 7 Ultimate. You have configured DirectAccess feature on the laptop of few sales managers so that they can access corporate network from remote locations. Their laptops run Windows 7 Ultimate. Which of the following options does the DirectAccess use to keep data safer while traveling through travels public networks?
A. IPv6-over-IPsec
B. IPSec-over-IPv4
C. VPN
D. SSL
Answer: A

Q: 2
Which of the following tools is used to detect spam email without checking the content?
A. Kismet
B. EtherApe
C. DCC
D. Sniffer
Answer: C

Q: 3
Fill in the blank with the appropriate facts regarding IP version 6 (IPv6).
IP addressing version 6 uses_____ -bit address. Its____ IP address assigned to a single host allows the host to send and receive data.
A. IP addressing version 6 uses 128 -bit address. Its unicast IP address assigned to a single host allows the host to send and receive data.
Answer: A

Q: 4
You work as a Network Administrator for a bank. For securing the bank's network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network.
After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed. What type of response is the IDS giving?
A. False Positive
B. True Negative
C. False Negative
D. True Positive
Answer: C

Q: 5
Which of the following commands in MQC tool matches IPv4 and IPv6 packets when IP parameter is missing?
A. Match access-group
B. Match fr-dlci
C. Match IP precedence
D. Match cos
Answer: C

Q: 6
Users on a TCP/IP network are able to ping resources using IP addresses. However, they are unable to connect to those resources through their host names. A malfunction or failure of which of the following servers may be the cause of the issue?
A. Proxy
B. DHCP
C. DNS
D. WINS
Answer: C

Q: 7
Which method would provide the highest level of protection for all data transmitted on the internal network only? (Click the Exhibit button on the toolbar to see the case study.)
A. IPSec tunnel mode
B. SSL
C. PPTP
D. SMB
E. IPSec transport mode
Answer: E

Q: 8
Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with the project of investigating an iPod, which is suspected to contain some explicit material. Adam wants to connect the compromised iPod to his system, which is running on Windows XP (SP2) operating system. He doubts that connecting the iPod with his computer may change some evidences and settings in the iPod. He wants to set the iPod to read-only mode. This can be done by changing the registry key within the Windows XP (SP2) operating system. Which of the following registry keys will Adam change to accomplish the task?
A. HKEY_LOCAL_MACHINE\CurrentControlset\Control\StorageDevicePolicies
B. HKEY_LOCAL_MACHINE\System\CurrentControlset\StorageDevicePolicies
C. HKEY_LOCAL_MACHINE\System\CurrentControlset\Control\StorageDevicePolicies
D. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
Answer: C

Q: 9
Which of the following types of cyber stalking damage the reputation of their victim and turn other people against them by setting up their own Websites, blogs or user pages for this purpose?
A. False accusations
B. False victimization
C. Encouraging others to harass the victim
D. Attempts to gather information about the victim
Answer: A

Q: 10
Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?
A. Asterisk logger
B. Access Pass View
C. FAU
D. Galleta
Answer: B

Q: 11
In which of the following IKE phases the IPsec endpoints establish parameters for a secure ISAKMP session?
A. IKE Phase 2.5
B. IKE Phase 2
C. IKE Phase 1
D. IKE Phase 1.5
Answer: C

Q: 12
Which of the following are default ports for the FTP service?
Each correct answer represents a complete solution. Choose two.
A. 80
B. 21
C. 20
D. 443
Answer: B,C

Q: 13
You work as a Network Administrator for TechPerfect Inc. The company has a corporate intranet setup. A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork. Which of the following steps will you take to accomplish the task?
A. Block the ICMP protocol through ACL.
B. Block the IPv6 protocol through ACL.
C. Block the UDP protocol through ACL.
D. Block the TCP protocol through ACL.
Answer: A

Q: 14
John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linuxbased network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses. Which of the following worms has attacked the computer?
A. Ramen
B. LoveLetter
C. Code red
D. Nimda
Answer: A

Q: 15
Which of the following work as traffic monitoring tools in the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.
A. MRTG
B. John the Ripper
C. IPTraf
D. Ntop
Answer: A,C,D

Q: 16
Which of the following types of firewall ensures that the packets are part of the established session?
A. Switch-level firewall
B. Application-level firewall
C. Stateful inspection firewall
D. Circuit-level firewall
Answer: C

Q: 17
Which of the following terms describes an attempt to transfer DNS zone data?
A. Reconnaissance
B. Encapsulation
C. Dumpster diving
D. Spam
Answer: A

Q: 18
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You want to get the protocol statistics and the active TCP/IP network connections of your computer. Which of the following will you use?
A. IPSTAT
B. SNMP
C. ARP
D. NBTSTAT
E. NETSTAT
Answer: E

Q: 19
What are the limitations of the POP3 protocol?
Each correct answer represents a complete solution. Choose three.
A. E-mails can be retrieved only from the Inbox folder of a mailbox. E-mails stored in any other folder are not accessible.
B. It is only a retrieval protocol. It is designed to work with other applications that provide the ability to send e-mails.
C. It does not support retrieval of encrypted e-mails.
D. It uses less memory space.
Answer: A,B,C

Q: 20
What is the order of the extension headers that is followed by IPv6?
A. Destination Options (first), Routing, IPv6 header, Hop-by-Hop, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.
B. Routing, Hop-by-Hop, Destination Options (first), Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.
C. Fragment, Routing, Hop-by-Hop, Destination Options (first), Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.
D. IPv6 header, Hop-by-Hop, Destination Options (first), Routing, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.
Answer: D

Q: 21
Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?
Each correct answer represents a complete solution. Choose two.
A. SYN flood attack
B. Teardrop attack
C. Land attack
D. Ping of Death attack
Answer: B, D

Q: 22
What are the advantages of stateless autoconfigration in IPv6?
Each correct answer represents a part of the solution. Choose three.
A. Ease of use.
B. It provides basic authentication to determine which systems can receive configuration data .
C. No server is needed for stateless autoconfigration.
D. No host configuration is necessary.
Answer: A, C, D

Q: 23
What are the advantages of an application layer firewall?
Each correct answer represents a complete solution. Choose all that apply.
A. It provides detailed logging information for management purposes.
B. It prevents most of the spoofing and DoS attacks.
C. It monitors and filters data.
D. It provides authentication to a device.
Answer: A, B, C

Q: 24
Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
Each correct answer represents a complete solution. Choose all that apply.
A. Slack space
B. Dumb space
C. Hidden partition
D. Unused Sectors
Answer: A, C, D

Q: 25
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system. Which of the following files will Adam investigate to accomplish the task?
A. /boot/grub/menu.lst
B. /grub/grub.com
C. /boot/boot.conf
D. /boot/grub/grub.conf
Answer: A

Q: 26
The National Shoes Inc. has an SNMP enabled router installed on its network. IT Manager wants to monitor all SNMP traffic generated by the router. So, he installs a Network Monitor on a Windows2000 Server computer on the network. The router is configured to send traps to an SNMP manager installed on another server. He wants to get a notification whenever the network router raises an SNMP trap. What will he do to achieve this?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a part of the solution. Choose two.
A. Install an SNMP manager on the router.
B. Start the Windows 2000 Alert Service on the server.
C. Create a TCP/IP filter on the server.
D. Create a Network Monitor filter that has a pattern match for SNMP traffic.
E. Create a Network Monitor trigger to run the NET SEND command.
F. Configure the network router to trap the IP address of the server.
Answer: D,E

Q: 27
Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?
A. Application protocol-based intrusion detection system (APIDS)
B. Protocol-based intrusion detection system (PIDS)
C. Network intrusion detection system (NIDS)
D. Host-based intrusion detection system (HIDS)
Answer: D

Q: 28
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
A. Signature-based
B. Network-based
C. File-based
D. Anomaly-based
Answer: D

Q: 29
Which of the following best describes the term protocol?
A. The ability to move data through layers of the OSI model.
B. The combination of cable type and access method used on a network.
C. A set of rules.
D. The permissible amount of data contained in a packet.
Answer: C

Q: 30
Which of the following types of scan does not open a full TCP connection?
A. ACK scan
B. FIN scan
C. Stealth scan
D. Idle scan
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved