Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCFW - GIAC Certified Firewall Analyst

Page: 12 / 12
Total 391 questions

In which of the following attacks does an attacker change the MAC address on the sniffer to one that is the same in another system on the local subnet?

A.

ARP spoofing

B.

MAC flooding

C.

IP spoofing

D.

MAC duplicating

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?

A.

Snort

B.

KisMAC

C.

Dsniff

D.

Kismet

You work as a Network Administrator for Net World Inc. You have configured a few routers on the company's network. You are required to accomplish the following goals:

l Encrypt all service passwords immediately.

l Ensure that encryption is also applied on the passwords changed in the future.

You run the following command.

Service password-encryption

Which of the goals will this action accomplish?

A.

The action will ensure that encryption is also applied on the passwords changed in the future.

B.

The action will accomplish neither of the goals.

C.

The action will accomplish both the goals.

D.

The action will encrypt all passwords immediately.

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be most helpful against Denial of Service (DOS) attacks?

A.

Stateful Packet Inspection (SPI) firewall

B.

Packet filtering firewall

C.

Honey pot

D.

Network surveys.

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?

A.

HTTPS

B.

SSL

C.

IPSec

D.

L2TP

Adam works on a Linux system. He is using Sendmail as the primary application to transmit e-mails. Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

A.

/log/var/logd

B.

/log/var/mailog

C.

/var/log/mailog

D.

/var/log/logmail

Which of the following address translation types only translates one (and only one) IP address to another without using ports?

A.

NAT

B.

Dynamic NAT

C.

PAT

D.

Static NAT