Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFW Practice Exam with Questions & Answers | Set: 2

Questions 11

Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack. What can he do to accomplish this?

Options:
A.

Use an SSL certificate.

B.

Use a proxy server.

C.

Use a firewall.

D.

Use EFS.

GIAC GCFW Premium Access
Questions 12

In which of the following situations does legal and authorized traffic cause an intrusion detection system (IDS) to generate an alert and slow down performance?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

False alert

B.

False illusion

C.

False generation

D.

False positives

Questions 13

You are implementing passive OS fingerprinting in a network. Which of the following aspects are required to be configured there?

Each correct answer represents a part of the solution. Choose all that apply.

Options:
A.

Edit signature vulnerable OS lists.

B.

Limit the attack relevance rating calculation to a specific IP address range.

C.

Define event action rules filters using the OS relevancy value of the target.

D.

Enable passive analysis.

E.

Define and import OS mappings.

Questions 14

You are the Network Administrator for a college. Wireless access is widely used at the college. You want the most secure wireless connections you can have. Which of the following would you use?

Options:
A.

WEP2

B.

WPA

C.

WPA2

D.

WEP

Questions 15

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:
A.

Network-based

B.

File-based

C.

Signature-based

D.

Anomaly-based

Questions 16

Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.

Which of the following protocols does the DCC use?

Options:
A.

ICMP

B.

UDP

C.

TELNET

D.

TCP

Questions 17

A company named Tech Perfect Inc. has a TCP/IP based network. An IPS sensor is deployed in the network and configured to operate in promiscuous mode. IP blocking functionality works there in order to stop traffic from an attacking host and it helps in analyzing what happens in the network.

The management wants to initiate a persistent connection with the managed devices until the block is removed. Which of the following will you configure in the network to accomplish the task?

Options:
A.

Access Control List

B.

Firewall

C.

Network Admission Control

D.

Virtual LAN

Questions 18

Which of the following techniques is used to identify attacks originating from a botnet?

Options:
A.

BPF-based filter

B.

Recipient filtering

C.

IFilter

D.

Passive OS fingerprinting

Questions 19

Which of the following protocols is used by voice over IP (VoIP) applications?

Options:
A.

ICMP

B.

IPv6

C.

UDP

D.

TCP

Questions 20

You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline. This type of IDS is called __________.

Options:
A.

Reactive IDS

B.

Signature Based

C.

Passive IDS

D.

Anomaly Based

GIAC Related Exams

How to pass GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test Exam
How to pass GIAC GCPM - GIAC Certified Project Manager Certification Practice Test Exam
How to pass GIAC GISF - GIAC Information Security Fundamentals Exam
How to pass GIAC GISP - GIAC Information Security Professional Exam
How to pass GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET Exam
How to pass GIAC GSSP-Java - GIAC Secure Software Programmer – Java Exam
How to pass GIAC GSSP-NET-CSHARP - GIAC GIAC Secure Software Programmer - C#.NET Exam

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.