Free Practice Test

Free GCIA Practice Test Questions and Answers (2026) | Cert Empire

GIAC GCIA

View Mode
Q: 1
Adam works as a Security Analyst for Umbrella Inc. He is performing real-time traffic analysis on IP networks using Snort. Adam is facing problems in analyzing intrusion dat a. Which of the following software combined with Snort can Adam use to get a visual representation of intrusion data? Each correct answer represents a complete solution. Choose all that apply.
Options
Q: 2
Which of the following malicious programs changes its signature continuously to be invisible to IDS?
Options
Q: 3
You work as a Network Administrator for McRobert Inc. Your company has a Windows NT 4.0 TCP/IP- based network. You want to list the cache of NetBIOS names and IP addresses. Which of the following utilities will you use?
Options
Q: 4
Which of the following encryption methods are used by the BlackBerry to provide security to the data stored in it? Each correct answer represents a complete solution. Choose two.
Options
Q: 5
Which of the following command line tools are available in Helix Live acquisition tool on Windows? Each correct answer represents a complete solution. Choose all that apply.
Options
Q: 6
You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains Windows Server 2008 based two-node Network Load Balancing (NLB) cluster named Info.nettech.com. The cluster is implemented for high availability and load balancing for the company's intranet Web site. You find that the users can see the Network Load Balancing (NLB) cluster on the network neighborhood. The users are able to connect to various services by using the Info.nettech.com. The cluster is configured with the one port rule that equally balances all TCP/IP traffic across the cluster nodes. You want to configure the cluster to accept only HTTP traffic. What will you do to accomplish the task? Each correct answer represents a part of the solution. Choose two.
Options
Q: 7
Who are the primary victims of smurf attacks on the contemporary Internet system?
Options
Q: 8
Which of the following is an open-source Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software?
Options
Q: 9
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer. You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?
Options
Q: 10

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password? Each correct answer represents a complete solution. Choose all that apply.

Options
Question 1 of 10

Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE