Pass4itsure > GIAC > GIAC Certifications > GCIA > GCIA Online Practice Questions and Answers

GCIA Online Practice Questions and Answers

Questions 4

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

A. Public key

B. Digital certificates

C. Twofish

D. RSA

Buy Now
Questions 5

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

A. Man trap

B. Network Intrusion Detection System (NIDS)

C. Biometric device

D. Host Intrusion Detection System (HIDS)

Buy Now
Questions 6

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

Which of the following tools can be used as a countermeasure to such an attack?

A. Obiwan

B. SmashGuard

C. Kismet

D. Absinthe

Buy Now
Questions 7

Which of the following utilities is used to display the current TCP/IP configuration of a Windows NT computer?

A. NBTSTAT

B. IPCONFIG

C. CONFIG.SYS

D. FTP

Buy Now
Questions 8

Andrew works as an Administrator for a Windows 2000 based network. The network has a primary external DNS server, and a secondary DNS server located on the ISP's UNIX server, in order to provide fault tolerance. Users complain that they are unable to connect to the URL when using the secondary server. What should Andrew do to resolve the problem?

A. He should disable the fast zone transfer in the Advanced tab of the Properties window on the secondary server.

B. He should select the BIND secondaries check box in the Zone Transfer tab of the Properties window on the primary server.

C. He should select the BIND secondaries check box in the Advanced tab of the Properties window on the primary server.

D. He should enable the fast zone transfer in the Advanced tab of the Properties window on the primary server.

Buy Now
Questions 9

Which of the following is an example of penetration testing?

A. Implementing HIDS on a computer

B. Simulating an actual attack on a network

C. Implementing NIDS on a network

D. Configuring firewall to block unauthorized traffic

Buy Now
Questions 10

Which of the following malicious programs changes its signature continuously to be invisible to IDS?

A. Boot sector virus

B. Trojan

C. Malware

D. Polymorphic virus

Buy Now
Questions 11

Which of the following image file formats uses a lossy data compression technique?

A. GIF

B. JPG

C. PNG

D. TIF

Buy Now
Questions 12

Which of the following commands used in Linux to create bit-stream images?

A. ss

B. xcopy

C. dd

D. img

Buy Now
Questions 13

Which of the following is the purpose of creating a Demilitarized zone (DMZ) in an enterprise network?

A. Performing Isolation

B. Creating Autonomous Systems

C. Intrusion Detection

D. Military usage

Buy Now
Exam Code: GCIA
Exam Name: GIAC Certified Intrusion Analyst (GCIA)
Last Update: Jan 04, 2025
Questions: 507
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99