Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFW Practice Exam with Questions & Answers | Set: 6

Questions 51

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. A Cisco switch is configured on the network. You change the original host name of the switch through the hostname command. The prompt displays the changed host name. After some time, power of the switch went off due to some reason. When power restored, you find that the prompt is displaying the old host name. What is the most likely cause?

Options:
A.

The changes were saved in running-config file.

B.

The startup-config file got corrupted.

C.

The running-config file got corrupted.

D.

Host name cannot be changed permanently once switch is configured.

GIAC GCFW Premium Access
Questions 52

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.

A firewall has been configured on the network. You configure a filter on the router. You verify that SMTP operations have stopped after the recent configuration. Which of the following ports will you have to open on the router to resolve the issue?

Options:
A.

25

B.

80

C.

20

D.

21

Questions 53

Which of the following types of firewall functions at the Session layer of OSI model?

Options:
A.

Switch-level firewall

B.

Circuit-level firewall

C.

Packet filtering firewall

D.

Application-level firewall

Questions 54

On which of the following interfaces of the router is the clock rate command used?

Options:
A.

DCE

B.

ETHERNET

C.

VIRTUAL LINE VTY

D.

DTE

Questions 55

Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Ping of Death attack

B.

SYN flood attack

C.

Teardrop attack

D.

Land attack

Questions 56

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

Options:
A.

These are the threats that originate from within the organization.

B.

These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

C.

These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

D.

These are the threats intended to flood a network with large volumes of access requests.

Questions 57

Which of the following are the types of intrusion detection systems?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Client-based intrusion detection system (CIDS)

B.

Network intrusion detection system (NIDS)

C.

Server-based intrusion detection system (SIDS)

D.

Host-based intrusion detection system (HIDS)

Questions 58

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Firewall

B.

Console

C.

Gateway

D.

Modem

E.

Sensor

Questions 59

Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

Options:
A.

Application protocol-based intrusion detection system (APIDS)

B.

Network intrusion detection system (NIDS)

C.

Protocol-based intrusion detection system (PIDS)

D.

Host-based intrusion detection system (HIDS)

Questions 60

John works as the Security Manager for PassGuide Inc. He wants to create the Profiler database that stores information about the network activity at Layer 3, Layer 4, and Layer 7. Which of the following will he use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Session creation

B.

Protocol contexts

C.

Ignore connection

D.

Session teardown

GIAC Related Exams

How to pass GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test Exam
How to pass GIAC GCPM - GIAC Certified Project Manager Certification Practice Test Exam
How to pass GIAC GISF - GIAC Information Security Fundamentals Exam
How to pass GIAC GISP - GIAC Information Security Professional Exam
How to pass GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET Exam
How to pass GIAC GSSP-Java - GIAC Secure Software Programmer – Java Exam
How to pass GIAC GSSP-NET-CSHARP - GIAC GIAC Secure Software Programmer - C#.NET Exam

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.