Free GCIA Exam Dumps

Question 46

Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?

Correct Answer:C

Question 47

Which of the following components are usually found in an Intrusion detection system (IDS)?
Each correct answer represents a complete solution. Choose two.

Correct Answer:AE

Question 48

You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?

Correct Answer:D

Question 49

Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.

Correct Answer:AB

Question 50

You are concerned about outside attackers penetrating your network via your company Web server. You wish to place your Web server between two firewalls. One firewall between the Web server and the outside world. The other between the Web server and your network. What is this called?

Correct Answer:A