Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCIA Exam Dumps - GIAC Security Administration Questions and Answers

Question # 74

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance

B.

Encapsulation

C.

Dumpster diving

D.

Spam

Buy Now
Question # 75

Adam works as a Network Administrator for passguide Inc. He wants to prevent the network from

DOS attacks. Which of the following is most useful against DOS attacks?

Options:

A.

Internet bot

B.

Honey Pot

C.

SPI

D.

Distributive firewall

Buy Now
Question # 76

Who are the primary victims of smurf attacks on the contemporary Internet system?

Options:

A.

FTP servers are the primary victim to smurf attacks

B.

IRC servers are the primary victim to smurf attacks

C.

SMTP servers are the primary victim to smurf attacks

D.

Mail servers are the primary victim to smurf attacks

Buy Now
Question # 77

Which of the following statements are true about UDP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

TFTP uses a UDP port for communication.

B.

UDP is an unreliable protocol.

C.

FTP uses a UDP port for communication.

D.

UDP works at the data-link layer of the OSI model.

E.

UDP is a connectionless protocol.

Buy Now
Question # 78

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.

A branch office is connected to the headquarters through a T1 line. Users at the branch office report poor voice quality on the IP phone while communicating with the headquarters. You find that an application, named WorkReport, at the branch office is suffocating bandwidth by sending large packets for file synchronization. You need to improve the voice quality on the IP phone. Which of the following steps will you choose to accomplish this?

Options:

A.

Configure traffic shaping to increase the time interval for the WorkReport packets.

B.

Configure traffic shaping to increase the time interval for the IP phone packets.

C.

Configure traffic shaping to reduce bandwidth for the IP phone.

D.

Configure traffic shaping to reduce bandwidth for WorkReport.

Buy Now
Question # 79

Which of the following OSI layers is responsible for protocol conversion, data encryption/decryption, and data compression?

Options:

A.

Network layer

B.

Data-link layer

C.

Presentation layer

D.

Transport layer

Buy Now
Exam Code: GCIA
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Aug 24, 2025
Questions: 508
GCIA pdf

GCIA PDF

$25.5  $84.99
GCIA Engine

GCIA Testing Engine

$28.5  $94.99
GCIA PDF + Engine

GCIA PDF + Testing Engine

$40.5  $134.99