♥♥ 2018 NEW RECOMMEND ♥♥

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW GCIA Exam Dumps (PDF & VCE):
Available on: https://www.exambible.com/GCIA-exam/

Act now and download your GIAC GCIA test today! Do not waste time for the worthless GIAC GCIA tutorials. Download Improve GIAC GIAC Certified Intrusion Analyst exam with real questions and answers and begin to learn GIAC GCIA with a classic professional.

Q33. Which of the following tools are used to determine the hop counts of an IP packet? 

Each correct answer represents a complete solution. Choose two. 


B. Ping 


D. Netstat 

Answer: AB

Q34. Which of the following conclusions can be drawn from viewing the given output generated by the PING command-line utility? 


A. The network bandwidth is heavily utilized. 

B. The IP address of the destination computer is not resolved. 

C. There is no connectivity between the source and the destination computer. 

D. The hub is not working. 

Answer: C

Q35. You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks? 

A. Configure Internet Protocol Security (IPSec). 

B. Configure Network address translation (NAT). 

C. Disable Windows firewall logging. 

D. Enable Windows firewall logging. 

Answer: D

Q36. Which of the following work as traffic monitoring tools in the Linux operating system? 

Each correct answer represents a complete solution. Choose all that apply. 


B. John the Ripper 

C. IPTraf 

D. Ntop 

Answer: ACD

Q37. Which method would provide the highest level of protection for all data transmitted on the internal network only? (Click the Exhibit button on the toolbar to see the case study.) 

A. IPSec tunnel mode 




E. IPSec transport mode 

Answer: E

Q38. Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats? 

Each correct answer represents a complete solution. Choose three. 

A. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access. 

B. These are the threats that originate from within the organization. 

C. These are the threats intended to flood a network with large volumes of access requests. 

D. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet. 

Answer: ACD

Q39. In which of the following IKE phases the IPsec endpoints establish parameters for a secure ISAKMP session? 

A. IKE Phase 2.5 

B. IKE Phase 2 

C. IKE Phase 1 

D. IKE Phase 1.5 

Answer: C

Q40. Which of the following utilities produces the output displayed in the image below? 






Answer: A