Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCFW - GIAC Certified Firewall Analyst

Page: 7 / 12
Total 391 questions

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be most helpful against Denial of Service (DOS) attacks?

A.

Stateful Packet Inspection (SPI) firewall

B.

Packet filtering firewall

C.

Network surveys.

D.

Honey pot

You work as a Network Administrator for TechPerfect Inc. The company has a corporate intranet setup.

A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork. Which of the following steps will you take to accomplish the task?

A.

Block the IPv6 protocol through ACL.

B.

Block the UDP protocol through ACL.

C.

Block the TCP protocol through ACL.

D.

Block the ICMP protocol through ACL.

Which of the following is a valid IPv6 address?

A.

123.111.243.123

B.

45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE

C.

45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

D.

45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

A.

IPsec

B.

Firewall

C.

ACL

D.

NAT

Which of the following fields are specified when rules are created for the Network Honeypot

rulebase?

Each correct answer represents a complete solution. Choose all that apply.

A.

A destination/service match condition

B.

Detection settings

C.

Operation mode

D.

Response options

Which of the following is like a malicious cache poisoning where fake data is placed in the cache of the name servers?

A.

Smurf attack

B.

Host name spoofing

C.

DNS spoofing

D.

SYN flood attack

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?

A.

SSL

B.

UDP

C.

HTTP

D.

IPSec

Which of the following command-line utilities is used to show the state of current TCP/IP connections?

A.

PING

B.

NSLOOKUP

C.

NETSTAT

D.

TRACERT

Which of the following describes the term inside global in NAT configuration?

A.

It is a local MAC address assigned to a host in a private network.

B.

It is the data that comes inside a local network from an external host.

C.

It is a local IP address assigned to a host in a private network.

D.

It is the registered (public) IP address that represents the inside hosts in private network to the outside network.

Which of the following Linux file systems is a journaled file system?

A.

ext3

B.

ext2

C.

ext

D.

ext4