GIAC GCFW - GIAC Certified Firewall Analyst Exam
Page: 1 / 79
Total 391 questions
Question #1 (Topic: Topic 1)
Which of the following can be monitored by using the host intrusion detection system
(HIDS)?
Each correct answer represents a complete solution. Choose two.
(HIDS)?
Each correct answer represents a complete solution. Choose two.
A. Computer performance
B. File system integrity
C. Storage space on computers
D. System files
Answer: B,D
Question #2 (Topic: Topic 1)
Each correct answer represents a complete solution. Choose two.
A. Firewall
B. Console
C. Gateway
D. Modem
E. Sensor
Answer: B,E
Question #3 (Topic: Topic 1)
Which of the following are the countermeasures against a man-in-the-middle attack?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
A. Using Secret keys for authentication.
B. Using public key infrastructure authentication.
C. Using Off-channel verification.
D. Using basic authentication.
Answer: A,B,C
Question #4 (Topic: Topic 1)
Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an
immediate router advertisement, instead of waiting for the next scheduled advertisement?
immediate router advertisement, instead of waiting for the next scheduled advertisement?
A. Router Advertisement
B. Neighbor Advertisement
C. Router Solicitation
D. Neighbor Solicitation
Answer: C
Question #5 (Topic: Topic 1)
Which of the following statements about the traceroute utility are true?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
A. It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection Systems.
B. It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host.
C. It records the time taken for a round trip for each packet at each router.
D. It is an online tool that performs polymorphic shell code attacks.
Answer: B,C