GCIA GIAC GCIA – GIAC Certified Intrusion Analyst Practice Test Free Practice Exam Questions (2025 Updated)
Prepare effectively for your GIAC GCIA GCIA – GIAC Certified Intrusion Analyst Practice Test certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.
Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?
Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?
Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following utilities allows to view all files including invisible files and folders on a Macintosh OS X?
What is the maximum size of an IP datagram for Ethernet?
Which of the following attacks is designed to deduce the brand and/or version of an operating system or application?
Which of the following techniques is used to log network traffic?
Which of the following is not a Denial of Service (DoS) attack?
Which of the following parts of hard disk in Mac OS X File system stores information related to the files?
Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?
Routers work at which layer of the OSI reference model?
Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?
Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?
Which of the following DNS resource records is used to resolve a host name to an IPv6 address?
What is the name of the group of blocks which contains information used by the operating system in Linux system?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?
Which of the following is the default port for Simple Network Management Protocol (SNMP)?
Which of the following wireless network standards operates on the 5 GHz band and transfers data at a rate of 54 Mbps?
You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?
What is the process of detecting unauthorized access known as?
Which of the following methods is a behavior-based IDS detection method?
Which of the following ports can be used for IP spoofing?
Which of the following algorithms produces a digital signature which is used to authenticate the bit-stream images?
Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?
John enters a URL http://www.cisco.com/web/learning in the web browser. A web page appears after he enters the URL. Which of the following protocols is used to resolve www.cisco.com into the correct IP address?
You work as a Network Administrator for Tech2tech Inc. You have configured a network-based IDS for your company.
You have physically installed sensors at all key positions throughout the network such that they all report to the command console.
What will be the key functions of the sensors in such a physical layout?
Each correct answer represents a complete solution. Choose all that apply.
Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized
Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet.
Which of the following security threats may occur if DMZ protocol attacks are performed?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?
You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?