Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFW Practice Exam with Questions & Answers | Set: 7

Questions 61

Which of the following components are used in the implementation of a wireless intrusion prevention system?

Each correct answer represents a part of the solution. Choose three.

Options:
A.

Server

B.

Console

C.

Sensor

D.

Analyzer

GIAC GCFW Premium Access
Questions 62

You are tasked with configuring your routers with a minimum security standard that includes the following:

l A local Username and Password configured on the router

l A strong privilege mode password

l Encryption of user passwords

l Configuring telnet and ssh to authenticate against the router user database

Choose the configuration that best meets these requirements.

Options:
A.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login

B.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login local

C.

RouterA(config)#service enable-password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login user

D.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable password n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login local

Questions 63

You work as a System Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. Your network is configured for IPv6 IP addressing. Which of the following commands will you use to test TCP/IP connectivity?

Options:
A.

ping

B.

traceroute

C.

ifconfig

D.

ping6

Questions 64

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes.

On the basis of above information, which of the following types of attack is Adam attempting to perform?

Options:
A.

Fraggle attack

B.

SYN Flood attack

C.

Ping of death attack

D.

Land attack

Questions 65

Sam works as a Security Manager for Gentech Inc. The company has a Windows-based network. Sam wants to prevent specific traffic from IDP processing in order to reduce false positives. Which of the following rulebases will he use to accomplish the task?

Options:
A.

SYN Protector rulebase

B.

Network Honeypot rulebase

C.

Exempt rulebase

D.

Backdoor rulebase

Questions 66

The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Network layer

B.

Transport layer

C.

Data Link layer

D.

Physical layer

Questions 67

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be most helpful against Denial of Service (DOS) attacks?

Options:
A.

Stateful Packet Inspection (SPI) firewall

B.

Packet filtering firewall

C.

Honey pot

D.

Network surveys.

Questions 68

Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.

Which of the following protocols does the DCC use?

Options:
A.

ICMP

B.

TELNET

C.

UDP

D.

TCP

Questions 69

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

Options:
A.

IPsec

B.

Firewall

C.

ACL

D.

NAT

Questions 70

John works as a Security Manager for Gentech Inc. The company has a Windows-based network.

John has been assigned a project to detect the services used by an attack to access the network.

For this purpose, he is required to use the predefined service objects of the rulebase. This predefined service object defines the services used in the attack to access the network. Which of the following objects will he create when he finds that the attack is not defined in the predefined service objects?

Options:
A.

Custom service objects

B.

Signature attack objects

C.

Protocol anomaly attack objects

D.

Compound attack objects

GIAC Related Exams

How to pass GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test Exam
How to pass GIAC GCPM - GIAC Certified Project Manager Certification Practice Test Exam
How to pass GIAC GISF - GIAC Information Security Fundamentals Exam
How to pass GIAC GISP - GIAC Information Security Professional Exam
How to pass GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET Exam
How to pass GIAC GSSP-Java - GIAC Secure Software Programmer – Java Exam
How to pass GIAC GSSP-NET-CSHARP - GIAC GIAC Secure Software Programmer - C#.NET Exam

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.