Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCIA Exam Dumps - GIAC Security Administration Questions and Answers

Question # 44

Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?

Options:

A.

Logical Link control and Media Access control

B.

Logical control and Link control

C.

Machine Link control and Logical Link control

D.

Data control and Media Access control

Buy Now
Question # 45

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dictionary attack

B.

Hybrid attack

C.

Brute Force attack

D.

Rule based attack

Buy Now
Question # 46

Which of the following firewalls keeps track of the state of network connections traveling across the network?

Options:

A.

Stateful firewall

B.

Application-level firewall

C.

Packet filtering firewall

D.

Circuit-level firewall

Buy Now
Question # 47

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Buffer-overflow attack

B.

Brute force attack

C.

Dictionary-based attack

D.

Password guessing

E.

Social engineering

F.

Zero-day attack

G.

Denial-of-service (DoS) attack

Buy Now
Question # 48

Which of the following are open-source vulnerability scanners?

Options:

A.

Nessus

B.

NetRecon

C.

Hackbot

D.

Nikto

Buy Now
Question # 49

You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline. This type of IDS is called __________.

Options:

A.

Anomaly Based

B.

Reactive IDS

C.

Passive IDS

D.

Signature Based

Buy Now
Question # 50

You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?

Options:

A.

NBTSTAT -s

B.

NETSTAT -s

C.

NETSTAT -n

D.

NBTSTAT -n

Buy Now
Question # 51

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

Options:

A.

These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

B.

These are the threats that originate from within the organization.

C.

These are the threats intended to flood a network with large volumes of access requests.

D.

These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

Buy Now
Question # 52

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Zero-day attack

B.

Dictionary-based attack

C.

Rainbow attack

D.

Denial-of-service (DoS) attack

E.

Brute force attack

F.

Buffer-overflow attack

G.

Password guessing

Buy Now
Question # 53

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You configure intrusion detection on the server. Which of the following alerts notifies that repeated attempts to a destination computer are being made and no corresponding ACK (acknowledge) packet is being communicated?

Options:

A.

IP half scan attack

B.

UDP bomb attack

C.

Land attack

D.

Ping of death attack

Buy Now
Exam Code: GCIA
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Aug 24, 2025
Questions: 508
GCIA pdf

GCIA PDF

$25.5  $84.99
GCIA Engine

GCIA Testing Engine

$28.5  $94.99
GCIA PDF + Engine

GCIA PDF + Testing Engine

$40.5  $134.99