Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFA Practice Exam with Questions & Answers | Set: 7

Questions 61

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

Options:
A.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

B.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer

C.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

D.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

GIAC GCFA Premium Access
Questions 62

Identify the port in the image given below, which can be connected to the hub to extend the number of ports, and up to 127 devices can be connected to it?

GCFA Question 62

Options:
Questions 63

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to allow direct access to the filesystems data structure. Which of the following Unix commands can you use to accomplish the task?

Options:
A.

du

B.

debugfs

C.

df

D.

dosfsck

Questions 64

You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company data. Which of the following is the most important step for you to take in preserving the chain of custody?

Options:
A.

Preserve the email server including all logs.

B.

Make copies of that employee's email.

C.

Seize the employee's PC.

D.

Place spyware on the employee's PC to confirm these activities.

Questions 65

Which of the following uses hard disk drive space to provide extra memory for a computer?

Options:
A.

Virtual memory

B.

File system

C.

Cluster

D.

RAM

Questions 66

Which of the following is used to authenticate asymmetric keys?

Options:
A.

Password

B.

Digital signature

C.

MAC Address

D.

Demilitarized zone (DMZ)

Questions 67

Which of the following hardware devices prevents broadcasts from crossing over subnets?

Options:
A.

Bridge

B.

Hub

C.

Modem

D.

Router

Questions 68

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He traceroutes the We-are-secure server and gets the following result:

GCFA Question 68

Considering the above traceroute result, which of the following statements can be true?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

While tracerouting, John's network connection has become slow.

B.

Some router along the path is down.

C.

The We-are-secure server is using a packet filtering firewall.

D.

The IP address of the We-are-secure server is not valid.

Questions 69

An attacker attempts to gain information about a network by specifically targeting the network resources and applications running on a computer. This method for gaining information is known as ______.

Options:
A.

Notification

B.

Scanning

C.

Enumeration

D.

Sensor

E.

Footprinting

F.

Passive response

Questions 70

Which of the following types of firewall functions at the Session layer of OSI model?

Options:
A.

Application-level firewall

B.

Switch-level firewall

C.

Packet filtering firewall

D.

Circuit-level firewall