Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > GIAC > GIAC Certifications > GCIA > GCIA Online Practice Questions and Answers

GCIA Online Practice Questions and Answers

Questions 4

Which of the following commands will you use with the tcpdump command to display the contents of the packets?

A. tcpdump -q

B. tcpdump -v

C. tcpdump -n

D. tcpdump A

Buy Now

Correct Answer: D

Questions 5

You work as a Network Administrator for Tech2tech Inc. You have configured a network-based IDS for your company.

You have physically installed sensors at all key positions throughout the network such that they all report to the command console.

What will be the key functions of the sensors in such a physical layout? Each correct answer represents a complete solution. Choose all that apply.

A. To collect data from operating system logs

B. To notify the console with an alert if any intrusion is detected

C. To analyze for known signatures

D. To collect data from Web servers

Buy Now

Correct Answer: BC

Questions 6

Which of the following firewalls keeps track of the state of network connections traveling across the network?

A. Stateful firewall

B. Application-level firewall

C. Packet filtering firewall

D. Circuit-level firewall

Buy Now

Correct Answer: A

Questions 7

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

A. Active IDS

B. Signature-based IDS

C. Passive IDS

D. Network-based IDS

Buy Now

Correct Answer: A

Questions 8

What are the advantages of an application layer firewall? Each correct answer represents a complete solution. Choose all that apply.

A. It provides detailed logging information for management purposes.

B. It prevents most of the spoofing and DoS attacks.

C. It monitors and filters data.

D. It provides authentication to a device.

Buy Now

Correct Answer: ABC

Questions 9

Which of the following are well-known ports?

Each correct answer represents a complete solution. Choose two.

A. 443

B. 21

C. 1024

D. 8080

Buy Now

Correct Answer: AB

Questions 10

Which of the following determines which protocols can be used by clients to access the Internet in an ISA Server enabled network?

A. SMTP filter

B. POP intrusion detection filter

C. Site and content rule

D. Protocol rule

Buy Now

Correct Answer: D

Questions 11

Which of the following commands used in Linux to create bit-stream images?

A. ss

B. xcopy

C. dd

D. img

Buy Now

Correct Answer: C

Questions 12

Which of the following Windows Registry key contains the password file of the user?

A. HKEY_USER

B. HKEY_DYN_DATA

C. HKEY_LOCAL_MACHINE

D. HKEY_CURRENT_CONFIG

Buy Now

Correct Answer: C

Questions 13

In which of the following attacks does a hacker imitate a DNS server and obtain the entire DNS database?

A. Illicit zone transfer attack

B. DNS poisoning attack

C. Illicit poisoning attack

D. DNS transfer attack

Buy Now

Correct Answer: A

Exam Code: GCIA
Exam Name: GIAC Certified Intrusion Analyst (GCIA)
Last Update: Jun 12, 2025
Questions: 507

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.