GIAC GCIA
Q: 1
Adam works as a Security Analyst for Umbrella Inc. He is performing real-time traffic analysis on IP
networks using Snort. Adam is facing problems in analyzing intrusion dat
a. Which of the following software combined with Snort can Adam use to get a visual representation
of intrusion data?
Each correct answer represents a complete solution. Choose all that apply.
Options
Q: 2
Which of the following malicious programs changes its signature continuously to be invisible to IDS?
Options
Q: 3
You work as a Network Administrator for McRobert Inc. Your company has a Windows NT 4.0 TCP/IP-
based network. You want to list the cache of NetBIOS names and IP addresses. Which of the
following utilities will you use?
Options
Q: 4
Which of the following encryption methods are used by the BlackBerry to provide security to the
data stored in it?
Each correct answer represents a complete solution. Choose two.
Options
Q: 5
Which of the following command line tools are available in Helix Live acquisition tool on Windows?
Each correct answer represents a complete solution. Choose all that apply.
Options
Q: 6
You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008
domain-based network. The network contains Windows Server 2008 based two-node Network Load
Balancing (NLB) cluster named Info.nettech.com. The cluster is implemented for high availability and
load balancing for the company's intranet Web site. You find that the users can see the Network Load
Balancing (NLB) cluster on the network neighborhood. The users are able to connect to various
services by using the Info.nettech.com. The cluster is configured with the one port rule that equally
balances all TCP/IP traffic across the cluster nodes. You want to configure the cluster to accept only
HTTP traffic. What will you do to accomplish the task?
Each correct answer represents a part of the solution. Choose two.
Options
Q: 7
Who are the primary victims of smurf attacks on the contemporary Internet system?
Options
Q: 8
Which of the following is an open-source Web server scanner that tests Web servers for dangerous
files/CGIs, outdated server software?
Options
Q: 9
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008
domain-based network. The network has three Windows Server 2008 member servers and 150
Windows Vista client computers. The network contains a Windows Server 2008 Core computer. You
want to install the DNS server role on the Windows Server 2008 Core computer. Which of the
following commands will you use to accomplish the task?
Options
Q: 10
Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password? Each correct answer represents a complete solution. Choose all that apply.
Options
Question 1 of 10