Try 12 GIAC Certified Intrusion Analyst (GCIA) sample questions and practice-test preview prompts on packet evidence, IDS alerts, TCP behavior, DNS tunneling, beaconing, NetFlow, TLS metadata, and SIEM correlation.
GIAC Certified Intrusion Analyst (GCIA) is a network-intrusion-analysis route for candidates who interpret packets, alerts, flow records, protocol behavior, and correlated evidence to identify suspicious activity.
Use this page to preview the kind of intrusion-analysis decisions a GCIA practice route should test. The questions below are original IT Mastery sample questions, not official GIAC exam questions.
Topic: packet analysis
A packet capture shows repeated outbound connections from one host to one rare external IP at nearly fixed intervals. What is the most useful next step?
Best answer: A
Explanation: Regular timed connections to rare infrastructure can indicate beaconing. Analysts should correlate timing, destination, and host evidence.
Topic: IDS alerts
An IDS signature fires on one packet, but the destination host runs a different service than the signature assumes. What should the analyst do?
Best answer: C
Explanation: Alerts need context. Asset role, protocol, payload, and follow-on behavior help distinguish real attacks from false positives.
Topic: TCP handshake
Why is a full TCP three-way handshake relevant when evaluating an attempted connection?
Best answer: B
Explanation: SYN, SYN-ACK, and ACK indicate session establishment. That is different from a scan or blocked attempt that never completed the handshake.
Topic: DNS tunneling
Which DNS pattern is most suspicious for possible tunneling?
Best answer: D
Explanation: DNS tunneling often creates long, unusual, high-entropy subdomain queries. Domain age, volume, and resolver context matter.
Topic: beaconing
What evidence best strengthens a beaconing hypothesis?
Best answer: A
Explanation: Beaconing analysis relies on repeated timing and destination behavior plus host context. One isolated connection is weaker evidence.
Topic: false positives
A rule flags internal vulnerability-scanner traffic as exploit attempts. What is the best response?
Best answer: C
Explanation: Tuning should reduce known noise without creating blind spots. Source, schedule, and expected behavior should be documented.
Topic: NetFlow
Which NetFlow pattern is most useful for identifying unusual data movement?
Best answer: B
Explanation: Flow records can show volume, direction, endpoints, and timing. Large unusual outbound transfers deserve investigation.
Topic: TLS metadata
Even when TLS payloads are encrypted, which metadata can still support investigation?
Best answer: D
Explanation: TLS encryption hides payload but not all metadata. Certificate, destination, timing, and fingerprint evidence can still guide analysis.
Topic: HTTP status
An attacker probes many application paths and receives mostly 404 responses, then one 200 response followed by a large download. What should the analyst examine?
Best answer: A
Explanation: Failed probes matter, but a successful response and data transfer are higher-value evidence. Analysts should inspect the path and follow-on activity.
Topic: segmentation evidence
A workstation in the office VLAN initiates connections to a database subnet that should be reachable only by application servers. What is the likely concern?
Best answer: C
Explanation: Unexpected cross-segment traffic can indicate policy gaps or attacker movement. Analysts should verify expected flows and enforcement points.
Topic: SIEM correlation
Why should intrusion analysts correlate IDS alerts with endpoint and identity logs?
Best answer: A
Explanation: Network evidence becomes more useful when linked to host and identity context. Correlation improves confidence and scope analysis.
Topic: attacker infrastructure
A domain used in suspicious traffic was registered yesterday, uses privacy protection, and appears in several unrelated alerts. What should the analyst do?
Best answer: D
Explanation: New and rare infrastructure is a risk indicator, not proof by itself. Analysts should correlate it with other evidence before deciding response.
| If you miss… | Drill this next |
|---|---|
| packet and flow questions | timing, direction, volume, sessions, and endpoints |
| alert interpretation questions | asset context, rule logic, and false-positive tuning |
| protocol questions | TCP, DNS, HTTP, TLS metadata, and expected behavior |
| correlation questions | SIEM, endpoint, identity, proxy, DNS, and threat-intel evidence |