Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCIA Exam Dumps - GIAC Security Administration Questions and Answers

Question # 64

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

Options:

A.

Linux Live CD

B.

DOS boot disk

C.

Secure Authentication for EnCase (SAFE)

D.

EnCase with a hardware write blocker

Buy Now
Question # 65

Nathan works as a professional Ethical Hacker. He wants to see all open TCP/IP and UDP ports of his computer. Nathan uses the netstat command for this purpose but he is still unable to map open ports to the running process with PID, process name, and path. Which of the following commands will Nathan use to accomplish the task?

Options:

A.

ping

B.

Psloggedon

C.

Pslist

D.

fport

Buy Now
Question # 66

Which of the following attacks is also known as the bucket-brigade attack?

Options:

A.

Rainbow attack

B.

ARP spoofing attack

C.

Man-in-the-middle attack

D.

DoS attack

Buy Now
Question # 67

Which of the following protocols is used by e-mail servers to send messages?

Options:

A.

SNMP

B.

FTP

C.

POP3

D.

SMTP

E.

HTTP

Buy Now
Question # 68

Which of the following encryption methods are used by the BlackBerry to provide security to the data stored in it?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Triple DES

B.

Blowfish

C.

AES

D.

RSA

Buy Now
Question # 69

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate Plagiarism occurred in the source code files of C#. Which of the following tools will you use to detect the software plagiarism?

Options:

A.

VAST

B.

Jplag

C.

SCAM

D.

Turnitin

Buy Now
Question # 70

Which of the following is an example of penetration testing?

Options:

A.

Implementing HIDS on a computer

B.

Simulating an actual attack on a network

C.

Implementing NIDS on a network

D.

Configuring firewall to block unauthorized traffic

Buy Now
Question # 71

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

Which of the following tools can be used as a countermeasure to such an attack?

Options:

A.

Obiwan

B.

SmashGuard

C.

Kismet

D.

Absinthe

Buy Now
Question # 72

Which of the following statements best describes the string matching method of signature analysis?

Options:

A.

String matching searches specific strings that may indicate an attack.

B.

String matching examines multiple fields from different protocols, such as source address, destination port, or TCP flags.

C.

In string matching, each packet is wrapped in predefined layers of different protocols.

D.

In string matching, an incoming packet is compared, byte by byte, with a single signature, a string of code.

Buy Now
Question # 73

Fill in the blank with the appropriate term.

___________ is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.

Options:

Buy Now
Exam Code: GCIA
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Aug 24, 2025
Questions: 508
GCIA pdf

GCIA PDF

$25.5  $84.99
GCIA Engine

GCIA Testing Engine

$28.5  $94.99
GCIA PDF + Engine

GCIA PDF + Testing Engine

$40.5  $134.99