Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFW Practice Exam with Questions & Answers | Set: 4

Questions 31

Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?

Options:
A.

Web proxy server

B.

Open proxy server

C.

Forced proxy server

D.

Caching proxy server

GIAC GCFW Premium Access
Questions 32

Which of the following protocols does IPsec use to perform various security functions in the network?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Skinny Client Control Protocol

B.

Authentication Header

C.

Encapsulating Security Payload

D.

Internet Key Exchange

Questions 33

Which of the following well-known ports is used by BOOTP?

Options:
A.

UDP 69

B.

TCP 161

C.

TCP 21

D.

UDP 67

Questions 34

Which of the following is a valid IPv6 address?

Options:
A.

45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE

B.

45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE

C.

123.111.243.123

D.

45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

Questions 35

Which of the following types of Intrusion Detection Systems consists of an agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state?

Options:
A.

HIDS

B.

NIDS

C.

APIDS

D.

PIDS

Questions 36

Which of the following devices is used to identify out-of-date software versions, applicable patches, system upgrades, etc?

Options:
A.

Retinal scanner

B.

Fingerprint reader

C.

Smart card reader

D.

Vulnerability scanner

Questions 37

Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?

Options:
A.

Overloading

B.

Dynamic NAT

C.

Overclocking

D.

Static NAT

Questions 38

Which of the following number ranges is used for the IP Standard ACL?

Options:
A.

100-199

B.

1000-1099

C.

600-699

D.

1-99

Questions 39

You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks. Which of the following applications will you use to accomplish the task?

Options:
A.

Network enumerator

B.

Web application security scanner

C.

Computer worm

D.

Port scanner

Questions 40

You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world. What tool would you use to accomplish this?

Options:
A.

Protocol analyzer

B.

Network mapper

C.

Packet sniffer

D.

A port scanner

GIAC Related Exams

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.