GIAC GCFW - GIAC Certified Firewall Analyst
Which of the following group management messages is used by routers to handle the IPv6 multicast routing?
Which of the following are open-source vulnerability scanners?
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.
John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?
Each correct answer represents a complete solution. Choose all that apply.
You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?
The stateful firewalls combine the significant flows into conversations. Which of the following properties is used to classify a flow?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?
Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers. Which of the following programs can Mark use to fulfill this requirement?
