Free GCIA Exam Dumps

Question 141

By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABD

Question 142

Which of the following wireless security features provides the best wireless security mechanism?

Correct Answer:B

Question 143

Which of the following tools is used to collect volatile data over a network?

Correct Answer:B

Question 144

Which of the following command-line utilities is used to show the state of current TCP/IP connections?

Correct Answer:C

Question 145

Sasha wants to add an entry to your DNS database for your mail server. Which of the following types of resource records will she use to accomplish this?

Correct Answer:C