Free GCIA Exam Dumps

Question 51

Which of the following proxy servers is also referred to as transparent proxies or forced proxies?

Correct Answer:D

Question 52

Which of the following attacks is based on the concept that IDSs cannot recognize Unicode encoded malicious data?

Correct Answer:C

Question 53

Which of the following DNS resource records is used to resolve a host name to an IPv6 address?

Correct Answer:A

Question 54

Steve works as a Network Administrator for Blue Tech Inc. All client computers in the company run the Windows Vista operating system. He often travels long distances on official duty. While traveling, he connects to the office server through his laptop by using remote desktop connection.
He wants to run an application that is available on the server of the company. When he connects to the server, he gets a message that the connection is blocked by the firewall. He returns to his office to resolve the issue. He opens the Windows Firewall Settings dialog box. What actions should he perform in the dialog box given below to accomplish the task?
[MISSING]

Correct Answer:A

Question 55

Which of the following protocols is used by e-mail servers to send messages?

Correct Answer:D