Free GIAC GCIA Questions
-
-
Page: 1/73
Total 364 Questions
Question No 1
Sasha wants to add an entry to your DNS database for your mail server. Which of the following types of resource records will she use to accomplish this?
Question No 2
John, a novice web user, makes a new E - mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.
Question No 3
Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
Question No 4
Which of the following statements about a host - based intrusion prevention system (HIPS) are true? Each correct answer represents a complete solution. Choose two.
Question No 5
Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed? Each correct answer represents a complete solution. Choose all that apply.
-
Page: 1/73
Total 364 Questions
-