GIAC GCFW - GIAC Certified Firewall Analyst
In which of the following attacks does an attacker change the MAC address on the sniffer to one that is the same in another system on the local subnet?
Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?
You work as a Network Administrator for Net World Inc. You have configured a few routers on the company's network. You are required to accomplish the following goals:
l Encrypt all service passwords immediately.
l Ensure that encryption is also applied on the passwords changed in the future.
You run the following command.
Service password-encryption
Which of the goals will this action accomplish?
You are the Administrator for a corporate network. You are concerned about denial of service attacks.
Which of the following would be most helpful against Denial of Service (DOS) attacks?
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?
Adam works on a Linux system. He is using Sendmail as the primary application to transmit e-mails. Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?
Which of the following address translation types only translates one (and only one) IP address to another without using ports?
