Question 61

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Correct Answer:B

Question 62

Which of the following methods is a behavior-based IDS detection method?

Correct Answer:C

Question 63

Which of the following is allowed by a company to be addressed directly from the public network and is hardened to screen the rest of its network from security exposure?

Correct Answer:C

Question 64

Which of the following statements about the traceroute utility are true?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BC

Question 65

Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

Correct Answer:A

Question 66

Which of the following DNS records is used for host name to IPv6 address resolution?

Correct Answer:D

START GCIA EXAM