Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Security Administration GCIA Syllabus Exam Questions Answers

Page: 4 / 19
Total 508 questions

GCIA - GIAC Certified Intrusion Analyst Practice Test Questions and Answers

Question 13

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 domainbased network. Mark wants to block all NNTP traffic between the network and the Internet. How will he configure the network?

Options:

A.

Disable anonymous logins in the NNTP configuration manager.

B.

Block port 25 by configuring the firewall.

C.

Block port 119 by configuring the firewall.

D.

Block TCP port 80 by configuring the firewall.

Question 14

Where is the Hypertext Transfer Protocol (HTTP) used?

Options:

A.

On a client/server-based Wide Area Network (WAN).

B.

On the Internet to download text files and graphic files.

C.

On a peer-to-peer based Local Area Network (LAN).

D.

On the World Wide Web (WWW) to display SQL database statistics.

E.

On the World Wide Web (WWW) to display Hypertext Markup Language (HTML) pages.

Question 15

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer. You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?

Options:

A.

start /w ocsetup DnsServercorerole

B.

net start "dns server"

C.

start /w ocsetup DNS-Server-Core-Role

D.

start /w ocsetup DnsServer

Question 16

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dig

B.

Host

C.

NSLookup

D.

DSniff

Page: 4 / 19
Total 508 questions