2013년 11월 18일 월요일

GCIA 시험문제 덤프 GIAC 자격증

ITExamDump는 IT인증자격증시험에 대비한 덤프공부가이드를 제공해드리는 사이트인데 여러분의 자격증 취득의 꿈을 이루어드릴수 있습니다. GIAC인증 GCIA시험을 등록하신 분들은 바로ITExamDump의GIAC인증 GCIA덤프를 데려가 주세요. 단기간에 시험패스의 기적을 가져다드리는것을 약속합니다.

ITExamDump의 제품들은 모두 우리만의 거대한IT업계엘리트들로 이루어진 그룹 즉 관련업계예서 권위가 있는 전문가들이 자기만의 지식과 지금까지의 경험으로 최고의 IT인증관련자료를 만들어냅니다. ITExamDump의 문제와 답은 정확도 적중률이 아주 높습니다. 우리의 덤프로 완벽한GIAC인증GCIA시험대비를 하시면 되겠습니다. 이렇게 어려운 시험은 우리GIAC인증GCIA덤프로 여러분의 고민과 꿈을 한방에 해결해드립니다.

GIAC GCIA인증시험패스 하는 동시에 여러분의 인생에는 획기적인 일 발생한것이죠, 사업에서의 상승세는 당연한것입니다. IT업계종사자라면 누구나 이런 자격증을 취득하고싶어하리라고 믿습니다. 많은 분들이 이렇게 좋은 인증시험은 아주 어렵다고 생각합니다. 네 많습니다. 패스할확율은 아주 낮습니다. 노력하지않고야 당연히 불가능하죠.GIAC GCIA시험은 기초지식 그리고 능숙한 전업지식이 필요요 합니다. 우리ITExamDump는 여러분들한테GIAC GCIA시험을 쉽게 빨리 패스할 수 있도록 도와주는 사이트입니다. 우리ITExamDump의GIAC GCIA시험관련자료로 여러분은 짧은시간내에 간단하게 시험을 패스할수 있습니다. 시간도 절약하고 돈도 적게 들이는 이런 제안은 여러분들한테 딱 좋은 해결책이라고 봅니다.

시험 번호/코드: GCIA
시험 이름: GIAC (GIAC Certified Intrusion Analyst)
당신이 구입하기 전에 시도
일년동안 무료 업데이트
100% 환불보장약속
100% 합격율 보장
Q&A: 508 문항
업데이트: 2013-11-17

GIAC인증 GCIA시험패스는 IT업계종사자들이 승진 혹은 연봉협상 혹은 이직 등 보든 면에서 날개를 가해준것과 같습니다.IT업계는 GIAC인증 GCIA시험을 패스한 전문가를 필요로 하고 있습니다. ITExamDump의GIAC인증 GCIA덤프로 시험을 패스하고 자격증을 취득하여 더욱더 큰 무대로 진출해보세요.

ITExamDump는IT업계전문가들이 그들의 노하우와 몇 년간의 경험 등으로 자료의 정확도를 높여 응시자들의 요구를 만족시켜 드립니다. 우리는 꼭 한번에GIAC GCIA시험을 패스할 수 있도록 도와드릴 것입니다. 여러분은GIAC GCIA시험자료 구매로 제일 정확하고 또 최신시험버전의 문제와 답을 사용할 수 있습니다. Pass4Tes의 인증시험적중 율은 아주 높습니다. 때문에 많은 IT인증시험준비중인분들에세 많은 편리를 드릴수 있습니다.100%정확도 100%신뢰.여러분은 마음편히 응시하시면 됩니다.

GCIA 덤프무료샘플다운로드하기: http://www.itexamdump.com/GCIA.html

NO.1 Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to
secure access to the network of the company from all possible entry points. He segmented the network
into several subnets and installed firewalls all over the network. He has placed very stringent rules on all
the firewalls, blocking everything in and out except ports that must be used.
He does need to have port 80 open since his company hosts a website that must be accessed from the
Internet. Adam is still worried about programs like Hping2 that can get into a network through covert
channels.
Which of the following is the most effective way to protect the network of the company from an attacker
using Hping2 to scan his internal network?
A. Block ICMP type 13 messages
B. Block all outgoing traffic on port 21
C. Block all outgoing traffic on port 53
D. Block ICMP type 3 messages
Answer: A

GIAC   GCIA   GCIA   GCIA자료

NO.2 You are the Network Administrator for a large corporate network. You want to monitor all network traffic
on your local network for suspicious activities and receive a notification when a possible attack is in
process. Which of the following actions will you take for this?
A. Enable verbose logging on the firewall
B. Install a network-based IDS
C. Install a DMZ firewall
D. Install a host-based IDS
Answer: B

GIAC   GCIA기출문제   GCIA덤프   GCIA   GCIA dump   GCIA

NO.3 Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run on
Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot. Andrew
wants to check the booting process. He suspects that an error persists in the bootloader of Mac OS X.
Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?
A. LILO
B. BootX
C. NT Loader
D. GRUB
Answer: B

GIAC기출문제   GCIA기출문제   GCIA기출문제   GCIA자료

NO.4 Which of the following statements about a host-based intrusion prevention system (HIPS) are true?
Each correct answer represents a complete solution. Choose two.
A. It can detect events scattered over the network.
B. It can handle encrypted and unencrypted traffic equally.
C. It cannot detect events scattered over the network.
D. It is a technique that allows multiple computers to share one or more IP addresses.
Answer: B,C

GIAC   GCIA   GCIA   GCIA자격증

NO.5 Which of the following tools performs comprehensive tests against web servers for multiple items,
including over 6100 potentially dangerous files/CGIs?
A. Dsniff
B. Snort
C. Nikto
D. Sniffer
Answer: C

GIAC dump   GCIA기출문제   GCIA인증

NO.6 Which of the following Web attacks is performed by manipulating codes of programming languages
such as SQL, Perl, Java present in the Web pages?
A. Command injection attack
B. Code injection attack
C. Cross-Site Request Forgery
D. Cross-Site Scripting attack
Answer: B

GIAC   GCIA기출문제   GCIA   GCIA기출문제   GCIA

NO.7 Which of the following is the default port for Simple Network Management Protocol (SNMP)?
A. TCP port 110
B. TCP port 25
C. TCP port 80
D. UDP port 161
Answer: D

GIAC   GCIA   GCIA시험문제   GCIA dumps   GCIA   GCIA

NO.8 John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite
fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
A. Dictionary attack
B. Hybrid attack
C. Brute Force attack
D. Rule based attack
Answer: A,B,C

GIAC덤프   GCIA자격증   GCIA   GCIA pdf

NO.9 Mark works as a Network Security Administrator for BlueWells Inc. The company has a
Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited
employees of the company. His presentation is about the External threats that the company recently faced
in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.
A. These are the threats that originate from outside an organization in which the attacker attempts to gain
unauthorized access.
B. These are the threats that originate from within the organization.
C. These are the threats intended to flood a network with large volumes of access requests.
D. These threats can be countered by implementing security controls on the perimeters of the network,
such as firewalls, which limit user access to the Internet.
Answer: A,C,D

GIAC자격증   GCIA   GCIA자격증   GCIA

NO.10 Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with
his first project. Adam collected all required evidences and clues. He is now required to write an
investigative report to present before court for further prosecution of the case. He needs guidelines to
write an investigative report for expressing an opinion. Which of the following are the guidelines to write
an investigative report in an efficient way?
Each correct answer represents a complete solution. Choose all that apply.
A. All ideas present in the investigative report should flow logically from facts to conclusions.
B. Opinion of a lay witness should be included in the investigative report.
C. The investigative report should be understandable by any reader.
D. There should not be any assumptions made about any facts while writing the investigative report.
Answer: A,C,D

GIAC최신덤프   GCIA인증   GCIA

NO.11 Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
A. Tunneling proxy server
B. Reverse proxy server
C. Anonymous proxy server
D. Intercepting proxy server
Answer: D

GIAC   GCIA인증   GCIA   GCIA dumps   GCIA   GCIA

NO.12 Which of the following file systems is designed by Sun Microsystems?
A. NTFS
B. CIFS
C. ZFS
D. ext2
Answer: C

GIAC   GCIA시험문제   GCIA   GCIA dump   GCIA

NO.13 Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to
him to investigate a computer, which is used by the suspect to sexually harass the victim using instant
messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover
password from instant messenger program, which suspect is using, to collect the evidence of the crime.
Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish
the task?
A. Asterisk Logger
B. Access PassView
C. Mail Pass View
D. MessenPass
Answer: D

GIAC   GCIA자료   GCIA dump

NO.14 Which of the following is known as a message digest?
A. Hash function
B. Hashing algorithm
C. Spider
D. Message authentication code
Answer: A

GIAC자료   GCIA   GCIA자격증

NO.15 This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a,
802.11b, and 802.11g standards. The main features of these tools are as follows: -It displays the signal
strength of a wireless network, MAC address, SSID, channel details, etc. -It is commonly used for the
following purposes:
A. War driving
B. Detecting unauthorized access points
C. Detecting causes of interference on a WLAN
D. WEP ICV error tracking
E. Making Graphs and Alarms on 802.11 Data, including Signal Strength
Answer: D

GIAC dump   GCIA pdf   GCIA   GCIA덤프   GCIA

NO.16 Sasha wants to add an entry to your DNS database for your mail server. Which of the following types of
resource records will she use to accomplish this.?
A. ANAME
B. SOA
C. MX
D. CNAME
Answer: C

GIAC dumps   GCIA시험문제   GCIA   GCIA dumps

NO.17 You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is
configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion
detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of
the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?
A. The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters
Properties dialog box is not enabled.
B. The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box
is not selected.
C. The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters
Properties dialog box is not enabled.
D. The Enable Intrusion detection check box on the General tab page of the IP Packet Filters Properties
dialog box is not selected.
Answer: D

GIAC인증   GCIA pdf   GCIA dumps   GCIA기출문제   GCIA최신덤프

NO.18 Which of the following methods is a behavior-based IDS detection method?
A. Knowledge-based detection
B. Protocol detection
C. Statistical anomaly detection
D. Pattern matching detection
Answer: C

GIAC인증   GCIA   GCIA

NO.19 Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned
to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime.
Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of
the mobile phone. Which of the following tools is Adam using?
A. FAU
B. FTK Imager
C. Galleta
D. Device Seizure
Answer: D

GIAC인증   GCIA최신덤프   GCIA dump   GCIA자료

NO.20 Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. Choose all that apply.
A. Limiting the amount of network bandwidth.
B. Blocking IP address.
C. Using LM hashes for passwords.
D. Using Intrusion detection systems.
E. Using the network-ingress filtering.
Answer: A,B,D,E

GIAC덤프   GCIA   GCIA최신덤프   GCIA덤프

NO.21 Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet
forum for online discussion. When a user visits the infected Web page, code gets automatically executed
and Ryan can easily perform acts like account hijacking, history theft etc.
Which of the following types of Cross-Site Scripting attack Ryan intends to do?
A. Document Object Model (DOM)
B. Non persistent
C. SAX
D. Persistent
Answer: D

GIAC   GCIA   GCIA   GCIA   GCIA   GCIA

NO.22 Which of the following statements are true about snort?
Each correct answer represents a complete solution. Choose all that apply.
A. It develops a new signature to find vulnerabilities.
B. It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans,
CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors
and system vulnerabilities, and DDoS clients.
C. It encrypts the log file using the 256 bit AES encryption scheme algorithm.
D. It is used as a passive trap to record the presence of traffic that should not be found on a network, such
as NFS or Napster connections.
Answer: A,B,D

GIAC   GCIA   GCIA최신덤프

NO.23 Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized
Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet.
Which of the following security threats may occur if DMZ protocol attacks are performed?
Each correct answer represents a complete solution. Choose all that apply.
A. Attacker can perform Zero Day attack by delivering a malicious payload that is not a part of the
intrusion detection/prevention systems guarding the network.
B. Attacker can gain access to the Web server in a DMZ and exploit the database.
C. Attacker managing to break the first firewall defense can access the internal network without breaking
the second firewall if it is different.
D. Attacker can exploit any protocol used to go into the internal network or intranet of the com pany
Answer: A,B,D

GIAC   GCIA   GCIA

NO.24 Adam works as a Security Analyst for Umbrella Inc. He is performing real-time traffic analysis on IP
networks using Snort. Adam is facing problems in analyzing intrusion data. Which of the following
software combined with Snort can Adam use to get a visual representation of intrusion data?
Each correct answer represents a complete solution. Choose all that apply.
A. Basic Analysis and Security Engine (BASE)
B. sguil
C. KFSensor
D. OSSIM
Answer: A,B,D

GIAC   GCIA   GCIA

NO.25 You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6
network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly
routable address. Which of the following types of addresses will you choose?
A. Site-local
B. Global unicast
C. Local-link
D. Loopback
Answer: B

GIAC시험문제   GCIA최신덤프   GCIA   GCIA덤프   GCIA

NO.26 SSH is a network protocol that allows data to be exchanged between two networks using a secure
channel. Which of the following encryption algorithms can be used by the SSH protocol?
Each correct answer represents a complete solution. Choose all that apply.
A. Blowfish
B. IDEA
C. DES
D. RC4
Answer: A,B,C

GIAC자료   GCIA최신덤프   GCIA

NO.27 You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000based
network. You want to verify the connectivity of a host in the network. Which of the following utilities will you
use?
A. PING
B. TELNET
C. NETSTAT
D. TRACERT
Answer: A

GIAC pdf   GCIA   GCIA인증   GCIA dump   GCIA   GCIA

NO.28 Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.
A. TRACERT
B. Ping
C. IPCONFIG
D. Netstat
Answer: A,B

GIAC인증   GCIA   GCIA시험문제   GCIA

NO.29 Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a
suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review
to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
A. Checkpoint files
B. EDB and STM database files
C. Temporary files
D. cookie files
Answer: A,B,C

GIAC   GCIA   GCIA   GCIA   GCIA

NO.30 Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to
investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer
runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He
knows that in Windows operating system, the data is searched in pre-defined steps for proper and
efficient analysis. Which of the following is the correct order for searching data on a Windows based
system?
A. Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces
B. Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces
C. Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system
D. Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps
Answer: B

GIAC자료   GCIA자료   GCIA

ITexamdump의 000-303덤프의 VCE테스트프로그램과 000-N45덤프는 한방에 시험을 패스하도록 도와드립니다. ITexamdump 에서는 최신버전의 1Y0-A28시험에 대비한 고품질 덤프와 LOT-406시험 최신버전덤프를 제공해드립니다. 최고품질 70-463시험자료는 100% 간단하게 시험패스하도록 최선을 다하고 있습니다. IT인증시험패스는 이토록 간단합니다.

시험자료링크: http://www.itexamdump.com/GCIA.html

댓글 없음:

댓글 쓰기