Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCIA Exam Dumps - GIAC Security Administration Questions and Answers

Question # 34

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

Options:

A.

Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces

B.

Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces

C.

Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system

D.

Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

Buy Now
Question # 35

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Knowledge-based detection

B.

Protocol detection

C.

Statistical anomaly detection

D.

Pattern matching detection

Buy Now
Question # 36

Which of the following password cracking attacks is implemented by calculating all the possible hashes for a set of characters?

Options:

A.

Brute force attack

B.

Dictionary attack

C.

Rainbow attack

D.

SQL injection attack

Buy Now
Question # 37

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

Options:

A.

libpcap

B.

WinPCap

C.

PCAP

D.

SysPCap

Buy Now
Question # 38

Which of the following organizations is dedicated to computer security research and information sharing?

Options:

A.

FBI

B.

NIPC

C.

Honeynet Project

D.

IEEE

Buy Now
Question # 39

Which of the following standard file formats is used by Apple's iPod to store contact information?

Options:

A.

HFS+

B.

vCard

C.

FAT32

D.

hCard

Buy Now
Question # 40

Which of the following files records all driver installations after the system has booted?

Options:

A.

setupapi.com

B.

recdriver.log

C.

drivinst.log

D.

setupapi.log

Buy Now
Question # 41

Which of the following tools can be used to check whether the network interface is in promiscuous mode or not?

Options:

A.

IPTraf

B.

MRTG

C.

Chkrootkit

D.

Ntop

Buy Now
Question # 42

Which of the following is computed from an arbitrary block of digital data for the purpose of detecting accidental errors?

Options:

A.

Hash filter

B.

Checksum

C.

Hash buster

D.

Firewall

Buy Now
Question # 43

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer.

You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?

Options:

A.

start /w ocsetup DNS-Server-Core-Role

B.

start /w ocsetup DnsServer

C.

start /w ocsetup DnsServercorerole

D.

net start "dns server"

Buy Now
Exam Code: GCIA
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Aug 24, 2025
Questions: 508
GCIA pdf

GCIA PDF

$25.5  $84.99
GCIA Engine

GCIA Testing Engine

$28.5  $94.99
GCIA PDF + Engine

GCIA PDF + Testing Engine

$40.5  $134.99