Question 79

Which of the following IPv4 to IPv6 transition methods uses encapsulation of IPv6 packets to traverse IPv4 networks?

Correct Answer:C

Question 80

Which of the following is an exact duplicate of computer's hard drive?

Correct Answer:B

Question 81

Which of the following port numbers are valid ephemeral port numbers?
Each correct answer represents a complete solution. Choose two.

Correct Answer:BD

Question 82

In which of the following IKE phases the IPsec endpoints establish parameters for a secure ISAKMP session?

Correct Answer:C

Question 83

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system. Which of the following files will Adam investigate to accomplish the task?

Correct Answer:A

Question 84

Which of the following statements are true about UDP?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABE

START GCIA EXAM