GIAC GCIA Exam Practice Questions (P. 3)
- Full Access (507 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
send
light_mode
delete
Question #22
Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
- AAll ideas present in the investigative report should flow logically from facts to conclusions.
- BOpinion of a lay witness should be included in the investigative report.
- CThe investigative report should be understandable by any reader.
- DThere should not be any assumptions made about any facts while writing the investigative report.
Correct Answer:
ACD
ACD
send
light_mode
delete
Question #23
Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
- ALimiting the amount of network bandwidth.
- BBlocking IP address.
- CUsing LM hashes for passwords.
- DUsing Intrusion detection systems.
- EUsing the network-ingress filtering.
Correct Answer:
ABDE
ABDE
send
light_mode
delete
Question #24
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?
send
light_mode
delete
Question #25
Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used.
He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about programs like Hping2 that can get into a network through covert channels.
Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?
He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about programs like Hping2 that can get into a network through covert channels.
Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?
- ABlock ICMP type 13 messages
- BBlock all outgoing traffic on port 21
- CBlock all outgoing traffic on port 53
- DBlock ICMP type 3 messages
Correct Answer:
A
A
send
light_mode
delete
Question #26
Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?
send
light_mode
delete
Question #27
Which of the following methods is a behavior-based IDS detection method?
- AKnowledge-based detection
- BProtocol detection
- CStatistical anomaly detection
- DPattern matching detection
Correct Answer:
C
C
send
light_mode
delete
Question #28
You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP
Packet Filters Properties dialog box are disabled. What is the most likely cause?
Packet Filters Properties dialog box are disabled. What is the most likely cause?
- AThe PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enabled.
- BThe Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.
- CThe Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enabled.
- DThe Enable Intrusion detection check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.
Correct Answer:
D
D
send
light_mode
delete
Question #29
Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?
- ACommand injection attack
- BCode injection attack
- CCross-Site Request Forgery
- DCross-Site Scripting attack
Correct Answer:
B
B
send
light_mode
delete
Question #30
You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?
send
light_mode
delete
All Pages