Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFW Practice Exam with Questions & Answers | Set: 10

Questions 91

Which of the following statements about Access control list (ACL) is true?

Each correct answer represents a complete solution. Choose three.

Options:
A.

Extended IP Access Control List permits or denies packets only from a specific source IP addresses.

B.

Standard IP Access Control List permits or denies packets only from specific source IP addr esses.

C.

Standard IP Access Control List can be used to permit or deny traffic from a specific source IP addresses or for a specific destination IP address, and port.

D.

Extended IP Access Control List permits or denies traffic from a specific source IP addresses or for a specific destination IP address, and port.

E.

Access control list filters packets or network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces.

GIAC GCFW Premium Access
Questions 92

You work as a Security Administrator for Tech Perfect Inc. You have implemented and configured a web application security scanner in the company's network. It helps in the automated review of the web applications with the defined purpose of discovering security vulnerabilities. In order to perform this task, the web application security scanner examines a number of vulnerabilities.

What are these vulnerabilities?

Each correct answer represents a complete solution. Choose three.

Options:
A.

Input/Output validation

B.

Server configuration mistakes/errors/version

C.

Specific application problems

D.

Denials of service against the TCP/IP stack

Questions 93

Which of the following command-line utilities is used to show the state of current TCP/IP connections?

Options:
A.

PING

B.

NSLOOKUP

C.

NETSTAT

D.

TRACERT

Questions 94

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

Options:
A.

Social engineering

B.

Smurf

C.

Denial-of-Service

D.

Man-in-the-middle

Questions 95

Fill in the blank with the appropriate tool name.

______________ is a network protocol analyzer tool that is used to capture packet data from an existing network or examine packet data from a pre-saved file.

Options:
Questions 96

Which of the following describes the term inside global in NAT configuration?

Options:
A.

It is a local MAC address assigned to a host in a private network.

B.

It is the data that comes inside a local network from an external host.

C.

It is a local IP address assigned to a host in a private network.

D.

It is the registered (public) IP address that represents the inside hosts in private network to the outside network.

Questions 97

Which of the following is a valid IPv6 address?

Options:
A.

123.111.243.123

B.

45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE

C.

45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

D.

45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE

Questions 98

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

Options:
A.

Neighbor Advertisement

B.

Neighbor Solicitation

C.

Router Solicitation

D.

Router Advertisement

Questions 99

Which of the following applications cannot proactively detect anomalies related to a computer?

Options:
A.

NIDS

B.

Anti-virus scanner

C.

Firewall installed on the computer

D.

HIDS

Questions 100

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?

Options:
A.

Kismet

B.

Dsniff

C.

Snort

D.

KisMAC

GIAC Related Exams

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.