giac GCIA Exam Questions

Questions for the GCIA were updated on : Nov 21 ,2025

Page 1 out of 34. Viewing questions 1-15 out of 509

Question 1

Which of the following is a software used to manage and access Mac-formatted drives on a Windows
computer?

  • A. VolumeExplorer
  • B. MacCarver
  • C. Typer
  • D. MacDrive
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

John works as a professional Ethical Hacker. He has been assigned a project to test the security of
www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can
bypass the firewall of the We-are-secure server. Which of the following tools will John use to
accomplish his task?

  • A. PsExec
  • B. PsList
  • C. Fpipe
  • D. Cain
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. Choose all that apply.

  • A. For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.
  • B. It increases the number of available IP addresses.
  • C. It provides improved authentication and security.
  • D. It uses 128-bit addresses.
  • E. It uses longer subnet masks than those used in IPv4.
Answer:

A, B, C, D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 4

Which of the following methods is used by forensic investigators to acquire an image over the
network in a secure manner?

  • A. Linux Live CD
  • B. DOS boot disk
  • C. Secure Authentication for EnCase (SAFE)
  • D. EnCase with a hardware write blocker
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants
to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will
Mark use to perform the required function?

  • A. D
  • B. N
  • C. Z
  • D. C
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Sandra, a novice computer user, works on Windows environment. She experiences some problem
regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to
check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following
switches will she use with CHKDSK command to accomplish the task?

  • A. CHKDSK /I
  • B. CHKDSK /R /F
  • C. CHKDSK /C /L
  • D. CHKDSK /V /X
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based
network. You want to verify the connectivity of a host in the network. Which of the following utilities
will you use?

  • A. PING
  • B. TELNET
  • C. NETSTAT
  • D. TRACERT
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following Web attacks is performed by manipulating codes of programming languages
such as SQL, Perl, Java present in the Web pages?

  • A. Command injection attack
  • B. Code injection attack
  • C. Cross-Site Request Forgery
  • D. Cross-Site Scripting attack
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is
configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion
detection on the server. You find that the different types of attacks on the Intrusion Detection tab
page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

  • A. The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enabled.
  • B. The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.
  • C. The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enabled.
  • D. The Enable Intrusion detection check box on the General tab page of the IP Packet Filters Properties dialog box is not selected.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following methods is a behavior-based IDS detection method?

  • A. Knowledge-based detection
  • B. Protocol detection
  • C. Statistical anomaly detection
  • D. Pattern matching detection
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following tools performs comprehensive tests against web servers for multiple items,
including over 6100 potentially dangerous files/CGIs?

  • A. Dsniff
  • B. Snort
  • C. Nikto
  • D. Sniffer
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to
secure access to the network of the company from all possible entry points. He segmented the
network into several subnets and installed firewalls all over the network. He has placed very
stringent rules on all the firewalls, blocking everything in and out except ports that must be used.
He does need to have port 80 open since his company hosts a website that must be accessed from
the Internet. Adam is still worried about programs like Hping2 that can get into a network through
covert channels.
Which of the following is the most effective way to protect the network of the company from an
attacker using Hping2 to scan his internal network?

  • A. Block ICMP type 13 messages
  • B. Block all outgoing traffic on port 21
  • C. Block all outgoing traffic on port 53
  • D. Block ICMP type 3 messages
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned
to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber
crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and
call logs of the mobile phone. Which of the following tools is Adam using?

  • A. FAU
  • B. FTK Imager
  • C. Galleta
  • D. Device Seizure
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Limiting the amount of network bandwidth
  • B. Blocking IP address
  • C. Using LM hashes for passwords
  • D. Using Intrusion detection systems
  • E. Using the network-ingress filtering
Answer:

A, B, D, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 15

Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with
his first project. Adam collected all required evidences and clues. He is now required to write an
investigative report to present before court for further prosecution of the case. He needs guidelines
to write an investigative report for expressing an opinion. Which of the following are the guidelines
to write an investigative report in an efficient way?
Each correct answer represents a complete solution. Choose all that apply.

  • A. All ideas present in the investigative report should flow logically from facts to conclusions.
  • B. Opinion of a lay witness should be included in the investigative report.
  • C. The investigative report should be understandable by any reader.
  • D. There should not be any assumptions made about any facts while writing the investigative report.
Answer:

A, C, D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2