GIAC GCFW - GIAC Certified Firewall Analyst Exam

Page:    1 / 79   
Total 391 questions

Which of the following can be monitored by using the host intrusion detection system
(HIDS)?
Each correct answer represents a complete solution. Choose two.

  • A. Computer performance
  • B. File system integrity
  • C. Storage space on computers
  • D. System files


Answer : B,D

Each correct answer represents a complete solution. Choose two.

  • A. Firewall
  • B. Console
  • C. Gateway
  • D. Modem
  • E. Sensor


Answer : B,E

Which of the following are the countermeasures against a man-in-the-middle attack?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Using Secret keys for authentication.
  • B. Using public key infrastructure authentication.
  • C. Using Off-channel verification.
  • D. Using basic authentication.


Answer : A,B,C

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

  • A. Router Advertisement
  • B. Neighbor Advertisement
  • C. Router Solicitation
  • D. Neighbor Solicitation


Answer : C

Which of the following statements about the traceroute utility are true?
Each correct answer represents a complete solution. Choose all that apply.

  • A. It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection Systems.
  • B. It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host.
  • C. It records the time taken for a round trip for each packet at each router.
  • D. It is an online tool that performs polymorphic shell code attacks.


Answer : B,C

Page:    1 / 79   
Total 391 questions