Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCIA Exam Dumps - GIAC Security Administration Questions and Answers

Question # 24

Which of the following is not a Denial of Service (DoS) attack?

Options:

A.

Smurf attack

B.

Code injection attack

C.

Ping of Death attack

D.

Teardrop attack

Buy Now
Question # 25

Which of the following is NOT the primary type of firewall?

Options:

A.

Network firewall

B.

Proxy based firewall

C.

Stateful inspection firewall

D.

Packet filter firewall

Buy Now
Question # 26

Which of the following hacking tools provides shell access over ICMP?

Options:

A.

John the Ripper

B.

Loki

C.

Nessus

D.

Nmap

Buy Now
Question # 27

Which of the following attacks is used to hack simple alphabetical passwords?

Options:

A.

Dictionary-based attack

B.

Sniffing

C.

Man-in-the-middle attack

D.

Black hat attack

Buy Now
Question # 28

John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?

Options:

A.

Sequence++ attack

B.

Phreaking

C.

Man-in-the-middle attack

D.

War dialing

Buy Now
Question # 29

Which of the following types of firewall functions at the Session layer of OSI model?

Options:

A.

Circuit-level firewall

B.

Switch-level firewall

C.

Packet filtering firewall

D.

Application-level firewall

Buy Now
Question # 30

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

  • It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.
  • It is commonly used for the following purposes:

Options:

A.

War driving

B.

Detecting unauthorized access points

C.

Detecting causes of interference on a WLAN

D.

WEP ICV error tracking

E.

Making Graphs and Alarms on 802.11 Data, including Signal Strength

Buy Now
Question # 31

Which of the following malicious programs changes its signature continuously to be invisible to IDS?

Options:

A.

Boot sector virus

B.

Trojan

C.

Malware

D.

Polymorphic virus

Buy Now
Question # 32

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He scans the We-are-secure server and gets the following result:

sysDescr.0 = STRING. "SunOS we-are-secure.com 4.1.3_U1 1 sun4m"

sysObjectID.0 = OID. enterprises.hp.nm.hpsystem.10.1.1

sysUpTime.0 = Timeticks: (156474552) 18 days, 12:00:09

sysContact.0 = STRING. ""

sysName.0 = STRING. "we-are-secure.com"

sysLocation.0 = STRING. ""

sysServices.0 = INTEGER: 6

Which of the following tools is John using to perform the scan?

Options:

A.

snmpwalk

B.

Kismet

C.

AirMagnet

D.

AiroPeek

Buy Now
Question # 33

What is the maximum size of an IP datagram for Ethernet?

Options:

A.

4500 bytes

B.

1024 bytes

C.

1200 bytes

D.

1500 bytes

Buy Now
Exam Code: GCIA
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Aug 24, 2025
Questions: 508
GCIA pdf

GCIA PDF

$25.5  $84.99
GCIA Engine

GCIA Testing Engine

$28.5  $94.99
GCIA PDF + Engine

GCIA PDF + Testing Engine

$40.5  $134.99