GIAC GCIA Exam Practice Questions (P. 2)
- Full Access (507 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a suspicious email that is sent using a Microsoft Exchange server.
Which of the following files will he review to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following files will he review to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
- ACheckpoint files
- BEDB and STM database files
- CTemporary files
- Dcookie files
Correct Answer:
ABC
ABC
send
light_mode
delete
Question #12
This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:
✑ It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.
✑ It is commonly used for the following purposes:
✑ It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.
✑ It is commonly used for the following purposes:
- AWar driving
- BDetecting unauthorized access points
- CDetecting causes of interference on a WLAN
- DWEP ICV error tracking
- EMaking Graphs and Alarms on 802.11 Data, including Signal Strength
Correct Answer:
D
D
send
light_mode
delete
Question #13
SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
send
light_mode
delete
Question #14
Adam works as a Security Analyst for Umbrella Inc. He is performing real-time traffic analysis on IP networks using Snort. Adam is facing problems in analyzing intrusion data. Which of the following software combined with Snort can Adam use to get a visual representation of intrusion data?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
send
light_mode
delete
Question #15
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.
Each correct answer represents a complete solution. Choose three.
- AThese are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.
- BThese are the threats that originate from within the organization.
- CThese are the threats intended to flood a network with large volumes of access requests.
- DThese threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.
Correct Answer:
ACD
ACD
send
light_mode
delete
Question #16
Which of the following file systems is designed by Sun Microsystems?
send
light_mode
delete
Question #17
network. You have to configure a computer with the IPv6
address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?
address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?
send
light_mode
delete
send
light_mode
delete
Question #19
Which of the following statements are true about snort?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
- AIt develops a new signature to find vulnerabilities.
- BIt detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS clients.
- CIt encrypts the log file using the 256 bit AES encryption scheme algorithm.
- DIt is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connections.
Correct Answer:
ABD
ABD
send
light_mode
delete
Question #20
Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?
send
light_mode
delete
All Pages