GIAC Certified Firewall Analyst v6.1 (GCFW)

Page:    1 / 27   
Total 397 questions

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

  • A. Hunt
  • B. Ettercap
  • C. Alchemy Remote Executor
  • D. Mendax


Answer : D

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

  • A. Nikto
  • B. Sniffer
  • C. Snort
  • D. Dsniff


Answer : A

Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

  • A. Application protocol-based intrusion detection system (APIDS)
  • B. Network intrusion detection system (NIDS)
  • C. Protocol-based intrusion detection system (PIDS)
  • D. Host-based intrusion detection system (HIDS)


Answer : D

command used?

  • A. DCE
  • B. ETHERNET
  • C. VIRTUAL LINE VTY
  • D. DTE


Answer : A

A company named Tech Perfect Inc. has a TCP/IP based network. An IPS sensor is deployed in the network and configured to operate in promiscuous mode. IP blocking functionality works there in order to stop traffic from an attacking host and it helps in analyzing what happens in the network.
The management wants to initiate a persistent connection with the managed devices until the block is removed. Which of the following will you configure in the network to accomplish the task?

  • A. Access Control List
  • B. Firewall
  • C. Network Admission Control
  • D. Virtual LAN


Answer : C

cannot be used to access the router from a computer?

  • A. Aux port
  • B. Console port
  • C. Serial port
  • D. Vty


Answer : C

In which of the following situations does legal and authorized traffic cause an intrusion detection system (IDS) to generate an alert and slow down performance?
Each correct answer represents a complete solution. Choose all that apply.

  • A. False alert
  • B. False illusion
  • C. False generation
  • D. False positives


Answer : A,D

Mark works as a Network Security Administrator for BlueWells Inc. The company has a
Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.

  • A. These are the threats that originate from within the organization.
  • B. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.
  • C. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.
  • D. These are the threats intended to flood a network with large volumes of access requests.


Answer : B,C,D

Which of the following protocols is used with a tunneling protocol to provide security?

  • A. EAP
  • B. FTP
  • C. IPX/SPX
  • D. IPSec


Answer : D

You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks. Which of the following applications will you use to accomplish the task?

  • A. Network enumerator
  • B. Web application security scanner
  • C. Computer worm
  • D. Port scanner


Answer : D

You are configuring a public access wireless connection. Which of the following is the best way to secure this connection?

  • A. Not broadcasting SSID
  • B. Using WPA encryption
  • C. Implementing anti virus
  • D. Using MAC filtering


Answer : B

Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?

  • A. WEP
  • B. WPA
  • C. L2TP
  • D. IPSec


Answer : A

Which of the following firewalls filters the traffic based on the header of the datagram?

  • A. Application-level firewall
  • B. Packet filtering firewall
  • C. Circuit-level firewall
  • D. Stateful inspection firewall


Answer : B

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the pre-attack phase to check the security of the We-are-secure network: l Gathering information l Determining the network range l Identifying active systems
Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

  • A. APNIC
  • B. ARIN
  • C. SuperScan
  • D. RIPE


Answer : C

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network.
A firewall has been configured on the network. You configure a filter on the router. You operations have stopped after the recent configuration. Which of the following ports will you have to open on the router to resolve the issue?

  • A. 25
  • B. 80
  • C. 20
  • D. 21


Answer : A

Page:    1 / 27   
Total 397 questions