Download GIAC Certified Intrusion Analyst.PracticeTest.GCIA.2018-10-26.1e.290q.vcex

Download Dump

File Info

Exam GIAC Certified Intrusion Analyst
Number GCIA
File Name GIAC Certified Intrusion Analyst.PracticeTest.GCIA.2018-10-26.1e.290q.vcex
Size 653 Kb
Posted October 26, 2018
Downloads 24

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%

Demo Questions

Question 1
Which of the following commands will you use with the tcpdump command to display the contents of the packets?

  • A: tcpdump -q
  • B: tcpdump -v
  • C: tcpdump -n
  • D: tcpdump –A

Question 2
You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?

  • A: ping -a
  • B: ping -4
  • C: ping -t
  • D: ping –l

Question 3
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

  • A: 80
  • B: 21
  • C: 443
  • D: 22

Question 4
Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. 
Which of the following addresses is a valid MAC address?

  • A: A3-07-B9-E3-BC-F9
  • B:
  • C: F936.28A1.5BCD.DEFA
  • D: 1011-0011-1010-1110-1100-0001

Question 5
Which of the following applications cannot proactively detect anomalies related to a computer?

  • A: NIDS
  • B: Firewall installed on the computer
  • C: HIDS
  • D: Anti-virus scanner

Question 6
Which of the following terms is used to represent IPv6 addresses?

  • A: Colon-dot
  • B: Colon-hexadecimal
  • C: Hexadecimal-dot notation
  • D: Dot notation

Question 7
Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?

  • A: Vedit
  • B: WinHex
  • C: HxD
  • D: Evidor

Question 8
A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

  • A: IPTables
  • B: OpenSSH
  • C: IPChains
  • D: Stunnel

Question 9
Which of the following port numbers are valid ephemeral port numbers? 
Each correct answer represents a complete solution. Choose two.

  • A: 143
  • B: 1025
  • C: 161
  • D: 1080

Question 10
Which of the following activities will you use to retrieve user names, and info on groups, shares, and services of networked computers?

  • A: Network tap
  • B: Packet crafting
  • C: Network mapping
  • D: Network enumerating



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files