Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

GCIA Sample Questions Answers

Questions 4

Which of the following protocols is used by TFTP as a file transfer protocol?

Options:

A.

UDP

B.

SNMP

C.

TCP

D.

SMTP

Buy Now
Questions 5

John works as a professional Ethical Hacker for SecureEnet Inc. The company has a Windowsbased network. All client computers run on Windows XP. A project has been assigned to John to investigate about the open ports responsible for various malicious attacks on the network. John wants to use the DOS command-line utility to find out the open ports. Which of the following DOS commands will John use to accomplish the task?

Options:

A.

tracert and pathping

B.

nslookup

C.

nbtstat

D.

netstat

Buy Now
Questions 6

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For recording the number of queries resolved

B.

For preventing malware attacks on a DNS server

C.

For measuring a DNS server's performance

D.

For monitoring unauthorized zone transfer

Buy Now
Questions 7

You work as a Network Administrator for NetTech Inc. You want to know the local IP address, subnet mask, and default gateway of a NIC in a Windows 98 computer. Which of the following utilities will you use to accomplish this ?

Options:

A.

TRACERT

B.

WINIPCFG

C.

NETSTAT

D.

FDISK

Buy Now
Questions 8

Which of the following programs is used to add words to spam e-mails so that the e-mail is not considered spam and therefore is delivered as if it were a normal message?

Options:

A.

Adler-32

B.

Hash filtrer

C.

Hash buster

D.

Checksum

Buy Now
Questions 9

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate computer of an unfaithful employee of SecureEnet Inc. Suspect's computer runs on Windows operating system. Which of the following sources will Adam investigate on a Windows host to collect the electronic evidences?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Allocated cluster

B.

Swap files

C.

Slack spaces

D.

Unused and hidden partition

Buy Now
Questions 10

You are responsible for security at a company that specializes in e-commerce. You realize that given the high volume of Web traffic, there is a significant chance of someone being able to breach your perimeter. You want to make sure that should this occur, you can redirect the attacker away from sensitive data. How would you best accomplish this?

Options:

A.

Implement a passive IDS

B.

Implement a honey pot.

C.

Implement a stateful packet inspection firewall.

D.

Implement a network based IDS.

Buy Now
Questions 11

You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.

B.

Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.

C.

Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.

D.

Look at the Web servers logs and normal traffic logging.

Buy Now
Questions 12

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police.

A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:

A.

Linux

B.

Mac OS

C.

MINIX 3

D.

Windows XP

Buy Now
Questions 13

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

Options:

A.

Hunt

B.

Alchemy Remote Executor

C.

Mendax

D.

Ettercap

Buy Now
Questions 14

Which of the following statements is NOT true about FAT16 file system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

FAT16 file system supports Linux operating system.

B.

FAT16 file system supports file-level compression.

C.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.

D.

FAT16 does not support file-level security.

Buy Now
Questions 15

What are the advantages of stateless autoconfigration in IPv6?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Ease of use.

B.

It provides basic authentication to determine which systems can receive configuration data

C.

No server is needed for stateless autoconfigration.

D.

No host configuration is necessary.

Buy Now
Questions 16

Which of the following utilities produces the output shown in the image below?

Options:

A.

IPCONFIG

B.

PING

C.

PATHPING

D.

TRACERT

Buy Now
Questions 17

Which of the following statements about the traceroute utility are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection Systems.

B.

It records the time taken for a round trip for each packet at each router.

C.

It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host.

D.

It is an online tool that performs polymorphic shell code attacks.

Buy Now
Questions 18

Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

Options:

A.

Application protocol-based intrusion detection system (APIDS)

B.

Protocol-based intrusion detection system (PIDS)

C.

Network intrusion detection system (NIDS)

D.

Host-based intrusion detection system (HIDS)

Buy Now
Questions 19

Adam works on a Linux system. He is using Sendmail as the primary application to transmit e-mails.

Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

Options:

A.

/log/var/mailog

B.

/var/log/logmail

C.

/var/log/mailog

D.

/log/var/logd

Buy Now
Questions 20

You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline. This type of IDS is called __________.

Options:

A.

Anomaly Based

B.

Reactive IDS

C.

Passive IDS

D.

Signature Based

Buy Now
Questions 21

You work as a Network Administrator for McRobert Inc. You plan to configure your Windows Vista computer for Internet access. To achieve this, which of the following communication protocols needs to be bound to the dial-up adapter?

Options:

A.

TCP/IP

B.

DLC

C.

NetBEUI

D.

AppleTalk

Buy Now
Questions 22

Which of the following best describes the term protocol?

Options:

A.

The ability to move data through layers of the OSI model.

B.

The combination of cable type and access method used on a network.

C.

A set of rules.

D.

The permissible amount of data contained in a packet.

Buy Now
Questions 23

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Demilitarized zone (DMZ)

B.

Intrusion detection system (IDS)

C.

Firewall

D.

Packet filtering

Buy Now
Questions 24

Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Close existing email account and open new email account.

B.

Forward a copy of the spam to the ISP to make the ISP conscious of the spam.

C.

Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.

D.

Send an email to the domain administrator responsible for the initiating IP address.

Buy Now
Questions 25

Which of the following is a hardware/software platform that is designed to analyze, detect, and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

Options:

A.

NIPS

B.

HIPS

C.

NIDS

D.

HIDS

Buy Now
Questions 26

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.

Signature-based

B.

Network-based

C.

File-based

D.

Anomaly-based

Buy Now
Questions 27

Which of the following is used as a default port by the TELNET utility?

Options:

A.

21

B.

80

C.

23

D.

20

Buy Now
Questions 28

Which of the following protocols is used by e-mail servers to send messages?

Options:

A.

SNMP

B.

FTP

C.

POP3

D.

SMTP

E.

HTTP

Buy Now
Questions 29

You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You want to get the protocol statistics and the active TCP/IP network connections of your computer. Which of the following will you use?

Options:

A.

IPSTAT

B.

SNMP

C.

ARP

D.

NBTSTAT

E.

NETSTAT

Buy Now
Questions 30

Which of the following utilities can generate a local static route table?

Each correct answer represents a complete solution. Choose two.

Options:

A.

ROUTE

B.

PING

C.

NETSTAT

D.

TRACERT

E.

NBTSTAT

Buy Now
Questions 31

Which of the following statements best describes the string matching method of signature analysis?

Options:

A.

String matching searches specific strings that may indicate an attack.

B.

String matching examines multiple fields from different protocols, such as source address, destination port, or TCP flags.

C.

In string matching, each packet is wrapped in predefined layers of different protocols.

D.

In string matching, an incoming packet is compared, byte by byte, with a single signature, a string of code.

Buy Now
Questions 32

Which of the following are not functions of the SNORT application?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Packet logging

B.

Virus detection

C.

Hard disk drive scanning

D.

Packet sniffing

E.

Intrusion detection

Buy Now
Questions 33

You work as a Network Administrator in a company. The NIDS is implemented on the network.

You want to monitor network traffic. Which of the following modes will you configure on the network interface card to accomplish the task?

Options:

A.

Promiscuous

B.

Audit mode

C.

Full Duplex

D.

Half duplex

Buy Now
Questions 34

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command. Which of the following commands will you use?

Options:

A.

ping -a

B.

ping -l

C.

ping -t

D.

ping –n

Buy Now
Questions 35

Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

Options:

A.

Data control and Media Access control

B.

Logical control and Link control

C.

Logical Link control and Media Access control

D.

Machine Link control and Logical Link control

Buy Now
Questions 36

Which of the following parts of hard disk in Mac OS X File system stores information related to the files?

Options:

A.

Resource fork

B.

Data fork

C.

System fork

D.

Log fork

Buy Now
Questions 37

What is the order of the extension headers that is followed by IPv6?

Options:

A.

Destination Options (first), Routing, IPv6 header, Hop-by-Hop, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

B.

Routing, Hop-by-Hop, Destination Options (first), Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

C.

Fragment, Routing, Hop-by-Hop, Destination Options (first), Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

D.

IPv6 header, Hop-by-Hop, Destination Options (first), Routing, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

Buy Now
Questions 38

Which of the following is not a Denial of Service (DoS) attack?

Options:

A.

Smurf attack

B.

Code injection attack

C.

Ping of Death attack

D.

Teardrop attack

Buy Now
Questions 39

This tool is known as __________.

Options:

A.

Kismet

B.

Absinthe

C.

NetStumbler

D.

THC-Scan

Buy Now
Questions 40

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Options:

A.

PsExec

B.

PsList

C.

Fpipe

D.

Cain

Buy Now
Questions 41

Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

All ideas present in the investigative report should flow logically from facts to conclusions.

B.

Opinion of a lay witness should be included in the investigative report.

C.

The investigative report should be understandable by any reader.

D.

There should not be any assumptions made about any facts while writing the investigative report.

Buy Now
Questions 42

What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

Options:

A.

Sircam

B.

Stoner

C.

Code Red

D.

Brain

Buy Now
Questions 43

Which of the following statements are true about snort?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It develops a new signature to find vulnerabilities.

B.

It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS clients.

C.

It encrypts the log file using the 256 bit AES encryption scheme algorithm.

D.

It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connections.

Buy Now
Questions 44

Which of the following partitions contains the system files that are used to start the operating system?

Options:

A.

Secondary partition

B.

Boot partition

C.

Primary partition

D.

System partition

Buy Now
Questions 45

Which of the following file systems is designed by Sun Microsystems?

Options:

A.

NTFS

B.

CIFS

C.

ZFS

D.

ext2

Buy Now
Questions 46

Which of the following is NOT an Intrusion Detection System?

Options:

A.

Fragroute

B.

Stunnel

C.

Samhain

D.

AIDE

Buy Now
Questions 47

What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

Options:

A.

Stoner

B.

Code Red

C.

Brain

D.

Sircam

Buy Now
Questions 48

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

Options:

A.

Linux Live CD

B.

DOS boot disk

C.

Secure Authentication for EnCase (SAFE)

D.

EnCase with a hardware write blocker

Buy Now
Questions 49

Which of the following commands is used to flush the destination cache for IPv6 interface?

Options:

A.

netsh interface ipv6 reset cache

B.

netsh interface ipv6 delete destinationcache

C.

netsh interface ipv6 flush destinationcache

D.

netsh interface ipv6 remove destinationcache

Buy Now
Questions 50

Which of the following techniques is used to log network traffic?

Options:

A.

Cracking

B.

IP address spoofing

C.

Tunneling

D.

Sniffing

Buy Now
Questions 51

Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?

Options:

A.

Ntoskrnl.exe

B.

Advapi32.dll

C.

Kernel32.dll

D.

Win32k.sys

Buy Now
Questions 52

Which of the following DNS resource records is used to resolve a host name to an IPv6 address?

Options:

A.

AAAA

B.

HINFO

C.

CNAME

D.

A

Buy Now
Questions 53

Which of the following types of attacks uses ICMP to consume bandwidth and crash sites?

Options:

A.

MITM attack

B.

SYN flood attack

C.

TFN attack

D.

XSS attack

Buy Now
Questions 54

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Options:

A.

Command injection attack

B.

Code injection attack

C.

Cross-Site Request Forgery

D.

Cross-Site Scripting attack

Buy Now
Questions 55

You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?

Options:

A.

PING

B.

TELNET

C.

NETSTAT

D.

TRACERT

Buy Now
Questions 56

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

Options:

A.

Dsniff

B.

Snort

C.

Nikto

D.

Sniffer

Buy Now
Questions 57

Which of the following firewalls depends on the three-way handshake of the TCP protocol?

Options:

A.

Stateful firewall

B.

Endian firewall

C.

Proxy-based firewall

D.

Packet filter firewall

Buy Now
Questions 58

Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

Options:

A.

CHKDSK /I

B.

CHKDSK /R /F

C.

CHKDSK /C /L

D.

CHKDSK /V /X

Buy Now
Questions 59

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used.

He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about programs like Hping2 that can get into a network through covert channels.

Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?

Options:

A.

Block ICMP type 13 messages

B.

Block all outgoing traffic on port 21

C.

Block all outgoing traffic on port 53

D.

Block ICMP type 3 messages

Buy Now
Questions 60

Which of the following TCP/UDP port is used by the toolkit program netstat?

Options:

A.

Port 23

B.

Port 15

C.

Port 7

D.

Port 69

Buy Now
Questions 61

Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?

Options:

A.

alter dnsserver

B.

delete dnsserver

C.

disable dnsserver

D.

remove dnsserver

Buy Now
Questions 62

Which of the following hacking tools provides shell access over ICMP?

Options:

A.

John the Ripper

B.

Loki

C.

Nessus

D.

Nmap

Buy Now
Questions 63

Which of the following is the process of categorizing attack alerts produced from IDS?

Options:

A.

Site policy implementation

B.

Blocking

C.

Intrusion classify

D.

Alarm filtering

Buy Now
Questions 64

Which of the following ports is used by Layer 2 Tunneling Protocol (L2TP)?

Options:

A.

UDP port 1701

B.

UDP port 67

C.

TCP port 23

D.

TCP port 25

Buy Now
Questions 65

What is the name of the group of blocks which contains information used by the operating system in Linux system?

Options:

A.

logblock

B.

Bootblock

C.

Superblock

D.

Systemblock

Buy Now
Questions 66

Which of the following DoS attacks points the Central Processing Unit (CPU) to a non-existent memory location causing the running process to end abruptly?

Options:

A.

Buffer Overflow attack

B.

Teardrop attack

C.

Fraggle attack

D.

Snork attack

Buy Now
Questions 67

Which of the following statements are true about an IPv6 network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.

B.

It increases the number of available IP addresses.

C.

It provides improved authentication and security.

D.

It uses 128-bit addresses.

E.

It uses longer subnet masks than those used in IPv4.

Buy Now
Questions 68

Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?

Options:

A.

disable dnsserver

B.

alter dnsserver

C.

delete dnsserver

D.

remove dnsserver

Buy Now
Questions 69

Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?

Options:

A.

D

B.

N

C.

Z

D.

C

Buy Now
Questions 70

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Knowledge-based detection

B.

Protocol detection

C.

Statistical anomaly detection

D.

Pattern matching detection

Buy Now
Questions 71

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

Options:

A.

The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enabled.

B.

The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.

C.

The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enabled.

D.

The Enable Intrusion detection check box on the General tab page of the IP Packet Filters

Properties dialog box is not selected.

Buy Now
Questions 72

Which of the following tools are used to determine the hop counts of an IP packet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

TRACERT

B.

Ping

C.

IPCONFIG

D.

Netstat

Buy Now
Questions 73

How many bits does IPv6 use in IP addresses?

Options:

A.

40 bits

B.

32 bits

C.

64 bits

D.

128 bits

Buy Now
Questions 74

An attacker wants to launch an attack on a wired Ethernet. He wants to accomplish the following tasks:

Sniff data frames on a local area network.

Modify the network traffic.

Stop the network traffic frequently.

Which of the following techniques will the attacker use to accomplish the task?

Options:

A.

IP spoofing

B.

Eavesdropping

C.

ARP spoofing

D.

Session hijacking

Buy Now
Questions 75

Maria works as the Chief Security Officer for passguide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?

Options:

A.

Encryption

B.

Public-key cryptography

C.

Steganography

D.

RSA algorithm

Buy Now
Questions 76

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system. Which of the following files will Adam investigate to accomplish the task?

Options:

A.

/boot/grub/menu.lst

B.

/grub/grub.com

C.

/boot/boot.conf

D.

/boot/grub/grub.conf

Buy Now
Questions 77

What is the maximum size of an IP datagram for Ethernet?

Options:

A.

4500 bytes

B.

1024 bytes

C.

1200 bytes

D.

1500 bytes

Buy Now
Questions 78

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer.

You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?

Options:

A.

start /w ocsetup DNS-Server-Core-Role

B.

start /w ocsetup DnsServer

C.

start /w ocsetup DnsServercorerole

D.

net start "dns server"

Buy Now
Questions 79

You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?

Options:

A.

NETSTAT -n

B.

NETSTAT -s

C.

NBTSTAT -n

D.

NBTSTAT -s

Buy Now
Questions 80

Which of the following is a checksum algorithm?

Options:

A.

Hash buster

B.

Snort

C.

Adler-32

D.

Dsniff

Buy Now
Questions 81

Which of the following is used for remote file access by UNIX/Linux systems?

Options:

A.

Server Message Block (SMB)

B.

Network File System (NFS)

C.

Common Internet File System (CIFS)

D.

NetWare Core Protocol (NCP)

Buy Now
Questions 82

Which of the following tools is used to recover data and partitions, and can run on Windows, Linux, SunOS, and Macintosh OS X operating systems?

Options:

A.

GetDataBack

B.

Acronis Recovery Expert

C.

Active@ Disk Image

D.

TestDisk

Buy Now
Questions 83

Which of the following is the unspecified address in IPv6?

Options:

A.

1:1:1:1:1:1:1:1

B.

0:0:0:0:0:0:0:0

C.

0:0:0:0:0:0:0:1

D.

1:0:0:0:0:0:0:0

Buy Now
Questions 84

Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.

Peter's manager suspects that someone is trying to log in to his computer in his absence. Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the users who have last logged in to the manager's system?

Each correct answer represents a complete solution. Choose two.

Options:

A.

lastb

B.

pwd

C.

last

D.

rwho -a

Buy Now
Questions 85

Which of the following tools can be used to check whether the network interface is in promiscuous mode or not?

Options:

A.

IPTraf

B.

MRTG

C.

Chkrootkit

D.

Ntop

Buy Now
Questions 86

Which of the following commands is used to refresh the Master Boot Record (MBR) in MS-DOS?

Options:

A.

CHKDSK

B.

FDISK

C.

XDISK

D.

FORMAT

Buy Now
Questions 87

Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to add a DNS server to a list of DNS servers for a specified interface?

Options:

A.

net dnsserver

B.

add address

C.

add dnsserver

D.

add neighbors

Buy Now
Questions 88

Which of the following fields of the IPv6 header is similar to the TTL field of IPv4?

Options:

A.

Hop Limit

B.

Next Header

C.

Flow Label

D.

Traffic Class

Buy Now
Questions 89

Which of the following terms is used to represent IPv6 addresses?

Options:

A.

Hexadecimal-dot notation

B.

Colon-dot

C.

Dot notation

D.

Colon-hexadecimal

Buy Now
Questions 90

Which of the following is a hardware/software platform that is designed to analyze, detect, and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

Options:

A.

NIPS

B.

HIDS

C.

NIDS

D.

HIPS

Buy Now
Questions 91

Smith works as a Network Administrator for HCP Inc. He sets up a DNS server on the network and enables DNS service on all computers. However, DNS is not working properly. Which of the following commands should Smith use to verify the DNS configuration?

Options:

A.

ping

B.

nslookup

C.

tracert

D.

pathping

Buy Now
Questions 92

Which of the following ports is used by e-mail clients to send request to connect to the server?

Options:

A.

Port 23

B.

Port 21

C.

Port 25

D.

Port 20

Buy Now
Questions 93

Which of the following classes refers to the fire involving electricity?

Options:

A.

Class B

B.

Class D

C.

Class A

D.

Class C

Buy Now
Questions 94

Sniffer operates at which layer of the OSI reference model?

Options:

A.

Data Link

B.

Physical

C.

Transport

D.

Presentation

Buy Now
Questions 95

Which of the following protocols does IPsec use to perform various security functions in the network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Encapsulating Security Payload

B.

Internet Key Exchange

C.

Skinny Client Control Protocol

D.

Authentication Header

Buy Now
Questions 96

Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?

Options:

A.

Cache memory test failed

B.

Mother board timer not operational

C.

Display memory error

D.

Processor failure

Buy Now
Questions 97

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

Options:

A.

LIDS

B.

Dsniff

C.

Cain

D.

Libnids

Buy Now
Questions 98

Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?

Options:

A.

Brute Force attack

B.

Hybrid attack

C.

Dictionary attack

D.

Rainbow attack

Buy Now
Questions 99

Which of the following is the process of categorizing attack alerts produced from IDS?

Options:

A.

Blocking

B.

Site policy implementation

C.

Intrusion classify

D.

Alarm filtering

Buy Now
Questions 100

Which of the following interfaces is NOT used for connecting a hard disk?

Options:

A.

IDE

B.

SCSI

C.

SATA

D.

PS/2

Buy Now
Questions 101

Which of the following are well-known ports?

Each correct answer represents a complete solution. Choose two.

Options:

A.

443

B.

21

C.

1024

D.

8080

Buy Now
Questions 102

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

Options:

A.

Spoofing

B.

Sending deceptive e-mails

C.

Network Configuration Changes

D.

Shunning

E.

Logging

F.

Sending notifications

Buy Now
Questions 103

What netsh command should be run to enable IPv6 routing?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

netsh interface IPv6 show interface

B.

netsh interface IPv6 add routes

C.

netsh interface IPv6 set interface

D.

netsh interface IPv6 add address

Buy Now
Questions 104

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

Options:

A.

Neighbor Solicitation

B.

Router Solicitation

C.

Neighbor Advertisement

D.

Router Advertisement

Buy Now
Questions 105

You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network.

You want to know the statistics of each protocol installed on your computer. Which of the following commands will you use?

Options:

A.

NBTSTAT -r

B.

NETSTAT -s

C.

NETSTAT -r

D.

NBTSTAT -s

Buy Now
Questions 106

Which of the following DoS attacks is a multi-tier attack?

Options:

A.

Snork Attack

B.

SYN flood

C.

DDoS attack

D.

Smurf attack

Buy Now
Questions 107

Which of the following utilities is used for decrypting WEP encryption on an 802.11b network?

Options:

A.

Wireshark

B.

NetStumbler

C.

Airsnort

D.

Kismet

Buy Now
Questions 108

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Attacker can use the Ping Flood DoS attack if WZC is used.

B.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

C.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

D.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

Buy Now
Questions 109

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

portsentry

B.

libnids

C.

nmap

D.

scanlogd

Buy Now
Questions 110

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

Options:

A.

DOS boot disk

B.

EnCase with a hardware write blocker

C.

Linux Live CD

D.

Secure Authentication for EnCase (SAFE)

Buy Now
Questions 111

Which of the following ports is used by NTP for communication?

Options:

A.

143

B.

123

C.

161

D.

53

Buy Now
Questions 112

You work as a Network Administrator for PassGuide Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.

Proxy-based firewall

B.

Endian firewall

C.

Stateful firewall

D.

Packet filter firewall

Buy Now
Questions 113

John works as a Network Administrator for Samtech Inc. He has configured CDP on each interface of the router. Which of the following commands should he use to list the number of CDP advertisements?

Options:

A.

show interfaces [type number]

B.

show cdp traffic

C.

show interfaces status

D.

show cdp

Buy Now
Questions 114

Which of the following ports can be used for IP spoofing?

Options:

A.

Whois 43

B.

POP 110

C.

NNTP 119

D.

Rlogin 513

Buy Now
Questions 115

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

Options:

A.

Public key

B.

Digital certificates

C.

Twofish

D.

RSA

Buy Now
Questions 116

You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows Server 2008 member servers and 120 Windows Vista client computers. You are implementing a caching-only DNS server on one of the member servers. Your assistant wants to know about the caching-only DNS server. Which of the following statements about the caching-only DNS server are correct?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It hosts zones and authoritative for a particular domain.

B.

It reduces the amount of DNS traffic on a Wide Area Network (WAN)

C.

It is useful at a site where DNS functionality is needed locally but there is not a requirement for a separate domain for that location.

D.

It performs queries, caches the answers, and returns the results.

Buy Now
Questions 117

Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

Options:

A.

CHKDSK /I

B.

CHKDSK /R /F

C.

CHKDSK /C /L

D.

CHKDSK /V /X

Buy Now
Questions 118

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

Options:

A.

libpcap

B.

WinPCap

C.

PCAP

D.

SysPCap

Buy Now
Questions 119

Users on a TCP/IP network are able to ping resources using IP addresses. However, they are unable to connect to those resources through their host names. A malfunction or failure of which of the following servers may be the cause of the issue?

Options:

A.

Proxy

B.

DHCP

C.

DNS

D.

WINS

Buy Now
Questions 120

Which of the following files in LILO booting process of Linux operating system stores the location of Kernel on the hard drive?

Options:

A.

/boot/boot.b

B.

/boot/map

C.

/sbin/lilo

D.

/etc/lilo.conf

Buy Now
Questions 121

Which of the following file systems supports the hot fixing feature?

Options:

A.

FAT16

B.

exFAT

C.

NTFS

D.

FAT32

Buy Now
Questions 122

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used.

He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about programs like Hping2 that can get into a network through covert channels.

Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?

Options:

A.

Block ICMP type 13 messages

B.

Block all outgoing traffic on port 21

C.

Block all outgoing traffic on port 53

D.

Block ICMP type 3 messages

Buy Now
Questions 123

Which of the following commands will you use with the tcpdump command to display the contents of the packets?

Options:

A.

tcpdump -q

B.

tcpdump -v

C.

tcpdump -n

D.

tcpdump –A

Buy Now
Questions 124

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

Options:

A.

A3-07-B9-E3-BC-F9

B.

132.298.1.23

C.

F936.28A1.5BCD.DEFA

D.

1011-0011-1010-1110-1100-0001

Buy Now
Questions 125

Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Checkpoint files

B.

EDB and STM database files

C.

Temporary files

D.

cookie files

Buy Now
Questions 126

You work as a Network Administrator for TechPerfect Inc. The company has a corporate intranet setup. A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork. Which of the following steps will you take to accomplish the task?

Options:

A.

Block the ICMP protocol through ACL.

B.

Block the IPv6 protocol through ACL.

C.

Block the UDP protocol through ACL.

D.

Block the TCP protocol through ACL.

Buy Now
Questions 127

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Tcpdump

B.

Ettercap

C.

Mendax

D.

Fragroute

Buy Now
Questions 128

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.

Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

Options:

A.

Anamoly-based detection

B.

Policy-based detection

C.

Honey pot detection

D.

Signature-based detection

Buy Now
Questions 129

Which of the following UDP ports are used by the Simple Network Management Protocol (SNMP)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

UDP port 69

B.

UDP port 161

C.

UDP port 137

D.

UDP port 162

Buy Now
Questions 130

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

Options:

A.

The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enabled.

B.

The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.

C.

The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enabled.

D.

The Enable Intrusion detection check box on the General tab page of the IP Packet Filters

Properties dialog box is not selected.

Buy Now
Questions 131

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

Options:

A.

Dsniff

B.

Libnids

C.

Cain

D.

LIDS

Buy Now
Questions 132

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network. Users complain of slow traffic on the network. You find that lots of faulty broadcasts are coming from an IP address. You want the Mac address of the source. Which of the following utilities will you use?

Options:

A.

TRACERT

B.

IPCONFIG

C.

ARP

D.

ROUTE

Buy Now
Questions 133

Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?

Options:

A.

Asterisk logger

B.

Access Pass View

C.

FAU

D.

Galleta

Buy Now
Questions 134

You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?

Options:

A.

ping -a

B.

ping -4

C.

ping -t

D.

ping –l

Buy Now
Questions 135

Which of the following tools are used to determine the hop counts of an IP packet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

TRACERT

B.

Ping

C.

IPCONFIG

D.

Netstat

Buy Now
Questions 136

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WPA with Pre Shared Key

B.

WPA with 802.1X authentication

C.

WEP

D.

WPA

Buy Now
Questions 137

Which of the following password cracking tools can work on the Unix and Linux environment?

Options:

A.

Brutus

B.

John the Ripper

C.

Cain and Abel

D.

Ophcrack

Buy Now
Questions 138

Adam works as a professional Computer Hacking Forensic Investigator. He has been called by the FBI to examine data of the hard disk, which is seized from the house of a suspected terrorist.

Adam decided to acquire an image of the suspected hard drive. He uses a forensic hardware tool, which is capable of capturing data from IDE, Serial ATA, SCSI devices, and flash cards. This tool can also produce MD5 and CRC32 hash while capturing the data. Which of the following tools is Adam using?

Options:

A.

ImageMASSter Solo-3

B.

ImageMASSter 4002i

C.

FireWire DriveDock

D.

Wipe MASSter

Buy Now
Questions 139

Which of the following statements about a host-based intrusion prevention system (HIPS) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It can detect events scattered over the network.

B.

It can handle encrypted and unencrypted traffic equally.

C.

It cannot detect events scattered over the network.

D.

It is a technique that allows multiple computers to share one or more IP addresses.

Buy Now
Questions 140

You work as a Network Administrator for McRobert Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You are configuring intrusion detection on the server. You want to get notified when a TCP SYN packet is sent with a spoofed source IP address and port number that match the destination IP address and port number. Mark the alert that you will enable on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box to accomplish the task.

Options:

Buy Now
Questions 141

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

Options:

A.

Man trap

B.

Network Intrusion Detection System (NIDS)

C.

Biometric device

D.

Host Intrusion Detection System (HIDS)

Buy Now
Questions 142

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

80

B.

21

C.

443

D.

22

Buy Now
Questions 143

Which of the following statements are true about snort?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It develops a new signature to find vulnerabilities.

B.

It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS clients.

C.

It encrypts the log file using the 256 bit AES encryption scheme algorithm.

D.

It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connections.

Buy Now
Questions 144

Which of the following types of firewall functions at the Session layer of OSI model?

Options:

A.

Circuit-level firewall

B.

Switch-level firewall

C.

Packet filtering firewall

D.

Application-level firewall

Buy Now
Questions 145

Adam works as a Security administrator for Umbrella Inc. He runs the following traceroute and notice that hops 19 and 20 both show the same IP address.

1 172.16.1.254 (172.16.1.254) 0.724 ms 3.285 ms 0.613 ms 2 ip68-98-176-

1.nv.nv.cox.net (68.98.176.1) 12.169 ms 14.958 ms 13.416 ms 3 ip68-98-176-

1.nv.nv.cox.net (68.98.176.1) 13.948 ms ip68-100-0-1.nv.nv. cox.net (68.100.0.1)

16.743 ms 16.207 ms 4 ip68-100-0-137.nv.nv.cox.net (68.100.0.137) 17.324 ms 13.933

ms 20.938 ms 5 68.1.1.4 (68.1.1.4) 12.439 ms 220.166 ms 204.170 ms

6 so-6-0-0.gar2.wdc1.Level3.net (67.29.170.1) 16.177 ms 25.943 ms 14.104 ms 7

unknown.Level3.net (209.247.9.173) 14.227 ms 17.553 ms 15.415 ms "PassGuide" -

8 so-0-1-0.bbr1.NewYork1.level3.net (64.159.1.41) 17.063 ms 20.960 ms 19.512 ms 9

so-7-0-0.gar1. NewYork1.Level3.net (64.159.1.182) 20.334 ms 19.440 ms 17.938 ms

10 so-4-0-0.edge1.NewYork1.Level3.

net (209.244.17.74) 27.526 ms 18.317 ms 21.202 ms 11 uunet-level3-

oc48.NewYork1.Level3.net

(209.244.160.12) 21.411 ms 19.133 ms 18.830 ms 12 0.so-6-0-0.XL1.NYC4.ALTER.NET

(152.63.21.78)

21.203 ms 22.670 ms 20.111 ms 13 0.so-2-0-0.TL1.NYC8.ALTER.NET (152.63.0.153)

30.929 ms 24.858 ms

23.108 ms 14 0.so-4-1-0.TL1.ATL5.ALTER.NET (152.63.10.129) 37.894 ms 33.244 ms

33.910 ms 15 0.so-7-0-0.XL1.MIA4.ALTER.NET (152.63.86.189) 51.165 ms 49.935 ms

49.466 ms 16 0.so-3-0-0.XR1.MIA4.ALTER.

NET (152.63.101.41) 50.937 ms 49.005 ms 51.055 ms 17 117.ATM6-

0.GW5.MIA1.ALTER.NET (152.63.82.73) 51.897 ms 50.280 ms 53.647 ms 18 passguidegw1.

customer.alter.net (65.195.239.14) 51.921 ms 51.571 ms 56.855 ms 19

www.passguide.com (65.195.239.22) 52.191 ms 52.571 ms 56.855 ms 20

www.passguide.com (65.195.239.22) 53.561 ms 54.121 ms 58.333 ms

Which of the following is the most like cause of this issue?

Options:

A.

Intrusion Detection System

B.

An application firewall

C.

Network Intrusion system

D.

A stateful inspection firewall

Buy Now
Questions 146

You are the Administrator for a Windows 2000 based network that uses DHCP to dynamically assign IP addresses to the clients and DNS servers. You want to ensure that the DNS servers can communicate with another DNS server. Which type of query will you run to achieve this?

Options:

A.

PATHPING

B.

NSLOOKUP

C.

PING

D.

Recursive

Buy Now
Questions 147

Which of the following applications cannot proactively detect anomalies related to a computer?

Options:

A.

NIDS

B.

Firewall installed on the computer

C.

HIDS

D.

Anti-virus scanner

Buy Now
Questions 148

Mark works as the Network Administrator of a Windows 2000 based network. The network has a DNS server installed. He experiences host name resolution problems on the network. In order to rectify the situation, he wants to troubleshoot DNS name resolution problems on the network.

Which of the following tools will he use to do this?

Options:

A.

NSLOOKUP

B.

IPCONFIG

C.

NBTSTAT

D.

NETSTAT

Buy Now
Questions 149

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Names of the victims

B.

Date and time of incident

C.

Nature of harassment

D.

Location of each incident

Buy Now
Questions 150

You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You have configured a WAN link for the network. You are facing connectivity problem across the WAN link. What will be your first step in troubleshooting the issue?

Options:

A.

Reinstall TCP/IP protocol.

B.

Check that the correct default gateway is set.

C.

Enable DNS.

D.

Ensure that NetBEUI protocol is loaded.

E.

Use the NETSTAT utility to view TCP/IP statistics.

Buy Now
Questions 151

Which of the following standard file formats is used by Apple's iPod to store contact information?

Options:

A.

HFS+

B.

vCard

C.

FAT32

D.

hCard

Buy Now
Questions 152

Which of the following can be applied as countermeasures against DDoS attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Limiting the amount of network bandwidth.

B.

Blocking IP address.

C.

Using LM hashes for passwords.

D.

Using Intrusion detection systems.

E.

Using the network-ingress filtering.

Buy Now
Exam Code: GCIA
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Sep 15, 2025
Questions: 508
$66  $164.99
$50  $124.99
$42  $104.99
buy now GCIA