Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFA Practice Exam with Questions & Answers | Set: 5

Questions 41

Which of the following attacks saturates network resources and disrupts services to a specific computer?

Options:
A.

Teardrop attack

B.

Polymorphic shell code attack

C.

Denial-of-Service (DoS) attack

D.

Replay attack

GIAC GCFA Premium Access
Questions 42

Which of the following file systems contains hardware settings of a Linux computer?

Options:
A.

/var

B.

/etc

C.

/proc

D.

/home

Questions 43

Adam works as a professional Penetration tester. A project has been assigned to him to employ penetration testing on the network of Umbrella Inc. He is running the test from home and had downloaded every security scanner from the Internet. Despite knowing the IP range of all of the systems, and the exact network configuration, Adam is unable to get any useful results.

Which of the following is the most like cause of this problem?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.

B.

Security scanners cannot perform vulnerability linkage.

C.

Security scanners are smart as their database and can find unpublished vulnerabilities.

D.

Security scanners are not designed to do testing through a firewall.

Questions 44

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He receives the following e-mail:

GCFA Question 44

The e-mail that John has received is an example of __________.

Options:
A.

Virus hoaxes

B.

Spambots

C.

Social engineering attacks

D.

Chain letters

Questions 45

Which of the following are the primary goals of the incident handling team?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Prevent any further damage.

B.

Freeze the scene.

C.

Repair any damage caused by an incident.

D.

Inform higher authorities.

Questions 46

Which of the following statements are NOT true about volume boot record or Master Boot Record?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

The end of MBR marker is h55CC.

B.

The actual program can be 512 bytes long.

C.

Volume boot sector is present at cylinder 0, head 0, and sector 1 of the default boot drive.

D.

Four 16 bytes master partition records are present in MBR.

Questions 47

Which of the following encryption methods uses AES technology?

Options:
A.

Dynamic WEP

B.

Static WEP

C.

TKIP

D.

CCMP

Questions 48

Which of the following tools are used for footprinting?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Sam spade

B.

Traceroute

C.

Whois

D.

Brutus

Questions 49

Mark is the Administrator of a Linux computer. He wants to check the status of failed Telnet-based login attempts on the Linux computer. Which of the following shell commands will he use to accomplish the task?

Options:
A.

GREP

B.

CP

C.

FSCK

D.

CAT

Questions 50

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:
A.

OpenSSH

B.

IPTables

C.

IPChains

D.

Stunnel