Leads4pass > GIAC > GIAC Certifications > GCIA > GCIA Online Practice Questions and Answers

GCIA Online Practice Questions and Answers

Questions 4

Which of the following proxy servers is also referred to as transparent proxies or forced proxies?

A. Tunneling proxy server

B. Reverse proxy server

C. Anonymous proxy server

D. Intercepting proxy server

Buy Now
Questions 5

Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

A. Checkpoint files

B. EDB and STM database files

C. Temporary files

D. cookie files

Buy Now
Questions 6

Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?

A. MAK ID

B. IP address

C. IP identification number

D. SSID

Buy Now
Questions 7

Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?

A. Vedit

B. WinHex

C. HxD

D. Evidor

Buy Now
Questions 8

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You want to know the current TCP/IP network configuration settings, DHCP server IP address, and DHCP lease expiration date of your

network.

Which of the following utilities will you use?

A. PING

B. TELNET

C. TRACERT

D. IPCONFIG

Buy Now
Questions 9

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system. Which of the following files will Adam investigate to accomplish the task?

A. /boot/grub/menu.lst

B. /grub/grub.com

C. /boot/boot.conf

D. /boot/grub/grub.conf

Buy Now
Questions 10

John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers. Which system is John using to track the malicious hackers?

A. Honeypot

B. Honeytokens

C. Intrusion Detection System (IDS)

D. Bastion host

Buy Now
Questions 11

Which of the following techniques allows the existence of both the Ipv6 and Ipv4 protocols in a device or network?

A. Duplexing

B. Dual stack

C. Clustering

D. Mirroring

Buy Now
Questions 12

Which of the following is an exact duplicate of computer's hard drive?

A. system image

B. bit-stream image

C. data image

D. drive image

Buy Now
Questions 13

Which of the following is not a Denial of Service (DoS) attack?

A. Smurf attack

B. Code injection attack

C. Ping of Death attack

D. Teardrop attack

Buy Now
Exam Code: GCIA
Exam Name: GIAC Certified Intrusion Analyst (GCIA)
Last Update: Jan 11, 2025
Questions: 507
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99