GIAC GCFW - GIAC Certified Firewall Analyst
In which of the following situations does legal and authorized traffic cause an intrusion detection system (IDS) to generate an alert and slow down performance?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following firewalls filters the traffic based on the header of the datagram?
Which of the following are the reasons that network administrators use Access Control Lists?
Each correct answer represents a complete solution. Choose two.
Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?
You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?
You work as a Network Troubleshooter for PassGuide Inc. You want to tunnel the IPv6 traffic across an IPv4 supporting portion of the company's network. You are using the interface configuration mode for the tunnel. Which of the following IP addresses will you enter after the tunnel source command?
Which of the following number ranges is used for the IP Standard ACL?
What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?
Which of the following is a maintenance protocol that permits routers and host computers to swap basic control information when data is sent from one computer to another?