Question 31

Which of the following monitors program activities and modifies malicious activities on a system?

Correct Answer:D

Question 32

Which of the following is the correct order of loading system files into the main memory of the system, when the computer is running on Microsoft's Windows XP operating system?

Correct Answer:D

Question 33

Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?

Correct Answer:C

Question 34

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

Correct Answer:B

Question 35

Which of the following is NOT an Intrusion Detection System?

Correct Answer:B

Question 36

Which of the following is the default port for TACACS?

Correct Answer:A

START GCIA EXAM