GIAC GCIA Exam Practice Questions (P. 5)
- Full Access (507 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
Which of the following commands will you use with the tcpdump command to display the contents of the packets?
send
light_mode
delete
Question #42
command to verify the connectivity
between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?
between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?
send
light_mode
delete
Question #43
terminal at
home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?
home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?
send
light_mode
delete
Question #44
Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access.
Which of the following addresses is a valid MAC address?
Which of the following addresses is a valid MAC address?
- AA3-07-B9-E3-BC-F9
- B132.298.1.23
- CF936.28A1.5BCD.DEFA
- D1011-0011-1010-1110-1100-0001
Correct Answer:
A
A
send
light_mode
delete
Question #45
Which of the following standard file formats is used by Apple's iPod to store contact information?
send
light_mode
delete
Question #46
Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?
- ARequest for service, initial analysis, data collection, data reporting, data analysis
- BInitial analysis, request for service, data collection, data analysis, data reporting
- CInitial analysis, request for service, data collection, data reporting, data analysis
- DRequest for service, initial analysis, data collection, data analysis, data reporting
Correct Answer:
D
D
send
light_mode
delete
Question #47
Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?
send
light_mode
delete
Question #48
Which of the following is the difference between SSL and S-HTTP?
- ASSL operates at the network layer and S-HTTP operates at the application layer.
- BSSL operates at the transport layer and S-HTTP operates at the application layer.
- CSSL operates at the application layer and S-HTTP operates at the transport layer.
- DSSL operates at the application layer and S-HTTP operates at the network layer.
Correct Answer:
B
B
send
light_mode
delete
Question #49
Which of the following applications cannot proactively detect anomalies related to a computer?
send
light_mode
delete
Question #50
addresses?
send
light_mode
delete
All Pages