Decide Fast & Get 50% Flat Discount on This SPECIAL OFFER | Limited Time Offer - Ends In COUPON CODE: SAVE50%

Free GIAC GCIA Questions

    1. Page: 1/73
      Total 364 Questions
    Question No 1
    Sasha wants to add an entry to your DNS database for your mail server. Which of the following types of resource records will she use to accomplish this?
    Choose the Choices:


    Question No 2
    John, a novice web user, makes a new E - mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.
    Choose the Choices:


    Question No 3
    Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
    Choose the Choices:


    Question No 4
    Which of the following statements about a host - based intrusion prevention system (HIPS) are true? Each correct answer represents a complete solution. Choose two.
    Choose the Choices:


    Question No 5
    Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed? Each correct answer represents a complete solution. Choose all that apply.
    Choose the Choices:



    1. Page: 1/73
      Total 364 Questions