Free GCIA Exam Dumps

Question 76

Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data that are created by the DNS cache poisoning?

Correct Answer:C

Question 77

Which of the following statements about the traceroute utility are true?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BC

Question 78

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Correct Answer:D

Question 79

Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?

Correct Answer:B

Question 80

An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network. Which of the following processes does an IDS perform?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABCD