Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCFW - GIAC Certified Firewall Analyst

Page: 9 / 12
Total 391 questions

Which of the following group management messages is used by routers to handle the IPv6 multicast routing?

A.

OSPF

B.

IGMP

C.

ARP

D.

ICMPv6

Which of the following are open-source vulnerability scanners?

A.

Nikto

B.

Hackbot

C.

NetRecon

D.

Nessus

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

A.

False negative

B.

False positive

C.

True negative

D.

True positive

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

A.

nc -v -n 208.100.2.25 80

B.

nc 208.100.2.25 23

C.

nmap -v -O www.we-are-secure.com

D.

nmap -v -O 208.100.2.25

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

A.

portsentry

B.

nmap

C.

libnids

D.

scanlogd

You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

Event logs

B.

Program logs

C.

System logs

D.

Web server logs

Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

A.

Man-in-the-middle

B.

Port scanning

C.

Session hijacking

D.

ARP spoofing

The stateful firewalls combine the significant flows into conversations. Which of the following properties is used to classify a flow?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Destination address

B.

Source port

C.

Protocol

D.

Destination port

E.

Source address

Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?

A.

0

B.

1

C.

2

D.

F

Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers. Which of the following programs can Mark use to fulfill this requirement?

A.

Microsoft Internet Security & Acceleration Server (ISA)

B.

Sniffer

C.

Wingate

D.

SOCKS