Free GCIA Exam Dumps

Question 126

Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

Correct Answer:D

Question 127

Which of the following tools implements a portable framework in tcpdump for capturing low-level network traffics in UNIX like networks?

Correct Answer:B

Question 128

You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?

Correct Answer:D

Question 129

Andrew works as an Administrator for a Windows 2000 based network. The network has a primary external DNS server, and a secondary DNS server located on the ISP's UNIX server, in order to provide fault tolerance. Users complain that they are unable to connect to the URL when using the secondary server. What should Andrew do to resolve the problem?

Correct Answer:C

Question 130

Which of the following are open-source vulnerability scanners?

Correct Answer:ACD