Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCFW - GIAC Certified Firewall Analyst

Page: 4 / 12
Total 391 questions

Which of the following steps are generally followed in computer forensic examinations?

Each correct answer represents a complete solution. Choose three.

A.

Encrypt

B.

Analyze

C.

Acquire

D.

Authenticate

Which of the following proxy servers is also referred to as transparent proxies or forced proxies?

A.

Reverse proxy server

B.

Intercepting proxy server

C.

Anonymous proxy server

D.

Tunneling proxy server

Which of the following attacking methods allows the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer by changing the Media Access Control address?

A.

IP address spoofing

B.

ARP spoofing

C.

MAC spoofing

D.

VLAN hoping

Choose the best explanation for the resulting error when entering the command below.

A.

The command is attempting to create a standard access list with extended access list param eters.

B.

The ACL commands should be entered from the (config-router) configuration mode.

C.

The wildcard mask is not provided for the source and destination addresses.

D.

The port number given does not correspond with the proper transport protocol.

Which of the following tools can be used as a Linux vulnerability scanner that is capable of identifying operating systems and network services?

Each correct answer represents a complete solution. Choose all that apply.

A.

Cheops-ng

B.

Fport

C.

Cheops

D.

Elsave

Which of the following IPv4 to IPv6 transition methods uses encapsulation of IPv6 packets to traverse IPv4 networks?

A.

Stack

B.

Translation

C.

Tunneling

D.

Dual-stack

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the preattack phase successfully:

l Information gathering

l Determination of network range

l Identification of active systems

l Location of open ports and applications

Now, which of the following tasks should he perform next?

A.

Install a backdoor to log in remotely on the We-are-secure server.

B.

Map the network of We-are-secure Inc.

C.

Perform OS fingerprinting on the We-are-secure network.

D.

Fingerprint the services running on the we-are-secure network.

Which of the following types of firewall ensures that the packets are part of the established session?

A.

Application-level firewall

B.

Switch-level firewall

C.

Stateful inspection firewall

D.

Circuit-level firewall

Which of the following firewalls operates at three layers- Layer3, Layer4, and Layer5?

A.

Application layer firewall

B.

Proxy firewall

C.

Dynamic packet-filtering firewall

D.

Circuit-level firewall

Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

A.

Fpipe

B.

tcptrace

C.

tcptraceroute

D.

Sniffer