Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GCFW - GIAC Certified Firewall Analyst

Page: 1 / 12
Total 391 questions

In which of the following situations does legal and authorized traffic cause an intrusion detection system (IDS) to generate an alert and slow down performance?

Each correct answer represents a complete solution. Choose all that apply.

A.

False alert

B.

False illusion

C.

False generation

D.

False positives

Which of the following firewalls filters the traffic based on the header of the datagram?

A.

Application-level firewall

B.

Packet filtering firewall

C.

Circuit-level firewall

D.

Stateful inspection firewall

Which of the following are the reasons that network administrators use Access Control Lists?

Each correct answer represents a complete solution. Choose two.

A.

Encrypting data to be routed

B.

Removing weak user password

C.

Controlling VTY access into a router

D.

Filtering traffic as it passes through a router

Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?

A.

Overloading

B.

Dynamic NAT

C.

Overclocking

D.

Static NAT

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

A.

Install a DMZ firewall

B.

Enable verbose logging on the firewall

C.

Install a host-based IDS

D.

Install a network-based IDS

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

A.

Hunt

B.

Ettercap

C.

Alchemy Remote Executor

D.

Mendax

You work as a Network Troubleshooter for PassGuide Inc. You want to tunnel the IPv6 traffic across an IPv4 supporting portion of the company's network. You are using the interface configuration mode for the tunnel. Which of the following IP addresses will you enter after the tunnel source command?

A.

The IPv4 address assigned to the local interface on which the tunnel is built

B.

The IPv4 address assigned to the remote interface on which the tunnel is built

C.

The IPv6 address assigned to the local tunnel interface

D.

The IPv6 address assigned to the remote tunnel interface

Which of the following number ranges is used for the IP Standard ACL?

A.

100-199

B.

1000-1099

C.

600-699

D.

1-99

What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?

A.

Use the TRACERT command with the /pingname parameter.

B.

Ping the source host with its computer name.

C.

Ping the source host with its IP address.

D.

Check the IP statistics on the file server.

Which of the following is a maintenance protocol that permits routers and host computers to swap basic control information when data is sent from one computer to another?

A.

ICMP

B.

SNMP

C.

IGMP

D.

BGP