Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFW Practice Exam with Questions & Answers | Set: 12

Questions 111

What netsh command should be run to enable IPv6 routing?

Each correct answer represents a part of the solution. Choose two.

Options:
A.

netsh interface IPv6 set interface

B.

netsh interface IPv6 show interface

C.

netsh interface IPv6 add address

D.

netsh interface IPv6 add routes

GIAC GCFW Premium Access
Questions 112

Which of the following steps are generally followed in computer forensic examinations?

Each correct answer represents a complete solution. Choose three.

Options:
A.

Authenticate

B.

Acquire

C.

Encrypt

D.

Analyze

Questions 113

In which of the following attacks does an attacker change the MAC address on the sniffer to one that is the same in another system on the local subnet?

Options:
A.

ARP spoofing

B.

MAC flooding

C.

IP spoofing

D.

MAC duplicating

Questions 114

You work as a Network Administrator for NetTech Inc. Your manager needs to access a particular server on the network from outside the company network. You have a registered IP address assigned to a router on the company network. Which of the following will be useful for accessing the server from outside the network?

Options:
A.

Overloading

B.

Dynamic VLAN

C.

Switch

D.

Static NAT

Questions 115

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. Choose all that apply.

Options:
A.

Prepare a chain of custody and handle the evidence carefully.

B.

Follow the rules of evidence and never temper with the evidence.

C.

Never exceed the knowledge base of the forensic investigation.

D.

Examine original evidence and never rely on the duplicate evidence.

Questions 116

Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?

Options:
A.

Cookies

B.

Sam Spade

C.

ACL

D.

NIDS

Questions 117

Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-topeer attacks when the laptops are used in public access network?

Options:
A.

Use protocol analyzer

B.

Use Port Address Translation

C.

Use security protocols

D.

Use firewall

GIAC Related Exams

How to pass GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test Exam
How to pass GIAC GCPM - GIAC Certified Project Manager Certification Practice Test Exam
How to pass GIAC GISF - GIAC Information Security Fundamentals Exam
How to pass GIAC GISP - GIAC Information Security Professional Exam
How to pass GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET Exam
How to pass GIAC GSSP-Java - GIAC Secure Software Programmer – Java Exam
How to pass GIAC GSSP-NET-CSHARP - GIAC GIAC Secure Software Programmer - C#.NET Exam

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.