New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GIAC Security Administration GCIA New Questions

Page: 10 / 19
Total 508 questions

GCIA - GIAC Certified Intrusion Analyst Practice Test Questions and Answers

Question 37

Which of the following programs is used to add words to spam e-mails so that the e-mail is not considered spam and therefore is delivered as if it were a normal message?

Options:

A.

Adler-32

B.

Hash filtrer

C.

Hash buster

D.

Checksum

Question 38

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

Options:

A.

Fragmentation overlap attack

B.

Evasion attack

C.

Fragmentation overwrite attack

D.

Insertion attack

Question 39

Sasha wants to add an entry to your DNS database for your mail server. Which of the following types of resource records will she use to accomplish this?

Options:

A.

ANAME

B.

SOA

C.

MX

D.

CNAME

Question 40

Which of the following command-line utilities is used to show the state of current TCP/IP connections?

Options:

A.

PING

B.

TRACERT

C.

NETSTAT

D.

NSLOOKUP

Page: 10 / 19
Total 508 questions