GIAC GCFW - GIAC Certified Firewall Analyst
You are the Administrator for a corporate network. You are concerned about denial of service attacks.
Which of the following would be most helpful against Denial of Service (DOS) attacks?
You work as a Network Administrator for TechPerfect Inc. The company has a corporate intranet setup.
A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork. Which of the following steps will you take to accomplish the task?
Which of the following is a valid IPv6 address?
An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?
Which of the following fields are specified when rules are created for the Network Honeypot
rulebase?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is like a malicious cache poisoning where fake data is placed in the cache of the name servers?
Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?
Which of the following command-line utilities is used to show the state of current TCP/IP connections?
Which of the following describes the term inside global in NAT configuration?
Which of the following Linux file systems is a journaled file system?
