Questions for the GCIA were updated on : Nov 21 ,2025
Which of the following is a software used to manage and access Mac-formatted drives on a Windows
computer?
D
John works as a professional Ethical Hacker. He has been assigned a project to test the security of
www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can
bypass the firewall of the We-are-secure server. Which of the following tools will John use to
accomplish his task?
C
Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. Choose all that apply.
A, B, C, D
Which of the following methods is used by forensic investigators to acquire an image over the
network in a secure manner?
C
Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants
to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will
Mark use to perform the required function?
B
Sandra, a novice computer user, works on Windows environment. She experiences some problem
regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to
check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following
switches will she use with CHKDSK command to accomplish the task?
B
You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based
network. You want to verify the connectivity of a host in the network. Which of the following utilities
will you use?
A
Which of the following Web attacks is performed by manipulating codes of programming languages
such as SQL, Perl, Java present in the Web pages?
B
You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is
configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion
detection on the server. You find that the different types of attacks on the Intrusion Detection tab
page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?
D
Which of the following methods is a behavior-based IDS detection method?
C
Which of the following tools performs comprehensive tests against web servers for multiple items,
including over 6100 potentially dangerous files/CGIs?
C
Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to
secure access to the network of the company from all possible entry points. He segmented the
network into several subnets and installed firewalls all over the network. He has placed very
stringent rules on all the firewalls, blocking everything in and out except ports that must be used.
He does need to have port 80 open since his company hosts a website that must be accessed from
the Internet. Adam is still worried about programs like Hping2 that can get into a network through
covert channels.
Which of the following is the most effective way to protect the network of the company from an
attacker using Hping2 to scan his internal network?
A
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned
to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber
crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and
call logs of the mobile phone. Which of the following tools is Adam using?
D
Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. Choose all that apply.
A, B, D, E
Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with
his first project. Adam collected all required evidences and clues. He is now required to write an
investigative report to present before court for further prosecution of the case. He needs guidelines
to write an investigative report for expressing an opinion. Which of the following are the guidelines
to write an investigative report in an efficient way?
Each correct answer represents a complete solution. Choose all that apply.
A, C, D