Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GCIA GIAC GCIA – GIAC Certified Intrusion Analyst Practice Test Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GCIA GCIA – GIAC Certified Intrusion Analyst Practice Test certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 6
Total 508 questions

Drag and drop the appropriate protocols to their respective port numbers they use by default.

A.

Which of the following firewalls inspects the actual contents of packets?

A.

Application-level firewall

B.

Stateful inspection firewall

C.

Packet filtering firewall

D.

Circuit-level firewall

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Brute Force attack

B.

Dictionary attack

C.

Rule based attack

D.

Hybrid attack

Which of the following is the purpose of creating a Demilitarized zone (DMZ) in an enterprise network?

A.

Performing Isolation

B.

Creating Autonomous Systems

C.

Intrusion Detection

D.

Military usage

Which of the following software is used for Steganography?

A.

CryptoForge

B.

Fort Knox

C.

Dsniff

D.

Ethreal

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

A.

LIDS

B.

Dsniff

C.

Cain

D.

Libnids

Which of the following is used over the Internet for better security?

A.

SOCKS

B.

S-HTTP

C.

Wingate

D.

IMAP Server

Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation?

Each correct answer represents a complete solution. Choose two.

A.

CRC

B.

HAVAL

C.

Twofish

D.

MD5

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You configure intrusion detection on the server. Which of the following alerts notifies that repeated attempts to a destination computer are being made and no corresponding ACK (acknowledge) packet is being communicated?

A.

IP half scan attack

B.

UDP bomb attack

C.

Land attack

D.

Ping of death attack

Which of the following image file formats uses a lossy data compression technique?

A.

GIF

B.

JPG

C.

PNG

D.

TIF

John works as a Network Administrator for Samtech Inc. He has configured CDP on each interface of the router. Which of the following commands should he use to list the number of CDP advertisements?

A.

show interfaces [type number]

B.

show cdp traffic

C.

show interfaces status

D.

show cdp

You work as a Network Administrator for McRobert Inc. Your company has a Windows NT 4.0 TCP/IP-based network. You want to list the cache of NetBIOS names and IP addresses. Which of the following utilities will you use?

A.

TELNET

B.

NBTSTAT

C.

TRACERT

D.

NETSTAT

For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.

Each correct answer represents a complete solution. Choose all that apply.

A.

NTP

B.

HTTP/HTTPS

C.

DNS

D.

DHCP

Which of the following IP addresses is the loopback address in IPv6?

A.

1:0:0:0:0:0:0:0

B.

0:0:0:0:0:0:0:0

C.

0:0:0:0:0:0:0:1

D.

0:0:0:1:1:0:0:0

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

A.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

B.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

C.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer

D.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer. You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?

A.

start /w ocsetup DnsServercorerole

B.

net start "dns server"

C.

start /w ocsetup DNS-Server-Core-Role

D.

start /w ocsetup DnsServer

Which of the following attacks is used to hack simple alphabetical passwords?

A.

Dictionary-based attack

B.

Sniffing

C.

Man-in-the-middle attack

D.

Black hat attack

Which of the following DOS commands is used to configure network protocols?

A.

netsh

B.

netsvc

C.

netstat

D.

ipconfig

Which of the following proxy servers can be used for spamming?

A.

Caching proxy server

B.

Web proxy server

C.

Open proxy server

D.

Anonymizing proxy server

Which of the following is NOT the primary type of firewall?

A.

Network firewall

B.

Proxy based firewall

C.

Stateful inspection firewall

D.

Packet filter firewall

Which of the following is an exact duplicate of computer's hard drive?

A.

system image

B.

bit-stream image

C.

data image

D.

drive image

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

A.

FAU

B.

FTK Imager

C.

Galleta

D.

Device Seizure

Which of the following types of attacks uses ICMP to consume bandwidth and crash sites?

A.

MITM attack

B.

SYN flood attack

C.

TFN attack

D.

XSS attack

How many bits does IPv6 use in IP addresses?

A.

40 bits

B.

32 bits

C.

64 bits

D.

128 bits

Which of the following is an automated vulnerability assessment tool?

A.

Kismet

B.

Nessus

C.

Sniffer

D.

Snort

What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

A.

Sircam

B.

Stoner

C.

Code Red

D.

Brain

This tool is known as __________.

A.

Kismet

B.

Absinthe

C.

NetStumbler

D.

THC-Scan

Which of the following ports is used by Layer 2 Tunneling Protocol (L2TP)?

A.

UDP port 1701

B.

UDP port 67

C.

TCP port 23

D.

TCP port 25

Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?

Each correct answer represents a complete solution. Choose all that apply.

A.

All ideas present in the investigative report should flow logically from facts to conclusions.

B.

Opinion of a lay witness should be included in the investigative report.

C.

The investigative report should be understandable by any reader.

D.

There should not be any assumptions made about any facts while writing the investigative report.

Which of the following firewalls depends on the three-way handshake of the TCP protocol?

A.

Stateful firewall

B.

Endian firewall

C.

Proxy-based firewall

D.

Packet filter firewall

Page: 3 / 6
Total 508 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved