[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GCIA Dumps with VCE and PDF 321-330

CollectDumps 2017 Sep GIAC Official New Released GCIA
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GCIA.html

Topic 1, Volume A

Question No: 321 – (Topic 3)

Which of the following are the two different file formats in which Microsoft Outlook saves e- mail messages based on system configuration?

Each correct answer represents a complete solution. Choose two.

  1. .txt

  2. .pst

  3. .xst

  4. .ost

Answer: B,D

Question No: 322 – (Topic 3)

Which of the following statements is true about ICMP packets?

Each correct answer represents a complete solution. Choose all that apply.

  1. The PING utility uses them to verify connectivity between two hosts.

  2. They guarantee the delivery of datagrams.

  3. They are encapsulated within IP datagrams.

  4. They use UDP datagrams.

  5. They are used to report errors if a problem in IP processing occurs.

Answer: A,C,E

Question No: 323 – (Topic 3)

You work as a Network Administrator for PassGuide Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?

  1. Proxy-based firewall

  2. Endian firewall

  3. Stateful firewall

  4. Packet filter firewall

Answer: A

Question No: 324 – (Topic 3)

Choose the proper transport protocol and port number used for Domain Name System. You should be concerned only with DNS lookups.

  1. tcp, port 53

  2. udp, port 53

  3. tcp, port 67

  4. udp, port 67

Answer: B

Question No: 325 – (Topic 3)

Which of the following statements is NOT true about the file slack spaces in Windows operating system?

  1. File slack is the space, which exists between the end of the file and the end of the last clust er.

  2. Large cluster size will decrease the volume of the file slack.

  3. File slack may contain data from the memory of the system.

  4. It is possible to find user names, passwords, and other important information in slack.

Answer: B

Question No: 326 – (Topic 3)

Which of the following protocols does IPsec use to perform various security functions in the network?

Each correct answer represents a complete solution. Choose all that apply.

  1. Encapsulating Security Payload

  2. Internet Key Exchange

  3. Skinny Client Control Protocol

  4. Authentication Header

Answer: A,B,D

Question No: 327 – (Topic 3)

You work as a Security Professional for PassGuide Inc. The company has a Linux-based network. You want to analyze the network traffic with Snort. You run the following command:

snort -v -i eth 0

Which of the following information will you get using the above command? Each correct answer represents a complete solution. Choose all that apply.

  1. Protocol statistics

  2. Date stamp on the packets

  3. Number of packets received and dropped

  4. Application layer data

Answer: A,B,C

Question No: 328 – (Topic 3)

Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

  1. Ping of Death attack

  2. DDoS attack

  3. SYN flood attack

  4. Teardrop attack

Answer: B

Question No: 329 – (Topic 3)

You work as a Network Administrator for McNeil Inc. The company#39;s Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You configure intrusion detection on the server. Which of the following alerts notifies that repeated attempts to a destination computer are being made and no corresponding ACK (acknowledge) packet is being communicated?

  1. IP half scan attack

  2. UDP bomb attack

  3. Land attack

  4. Ping of death attack

Answer: A

Question No: 330 – (Topic 3)

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?

Each correct answer represents a complete solution. Choose two.

  1. Attacker can use the Ping Flood DoS attack if WZC is used.

  2. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

  3. It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

  4. Attacker by creating a fake wireless network with high power antenna cause Victor#39;s computer to associate with his network to gain access.

Answer: B,D

100% Free Download!
Download Free Demo:GCIA Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GCIA Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE