Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFW Practice Exam with Questions & Answers | Set: 8

Questions 71

Which of the following number ranges is used for the IPX Standard ACL?

Options:
A.

800-899

B.

1000-1099

C.

900-999

D.

1200-1299

GIAC GCFW Premium Access
Questions 72

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. You have searched all open ports of the we-are-secure server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of the following tools can you use to accomplish the task?

Options:
A.

NBTscan

B.

Nmap

C.

P0f

D.

Superscan

Questions 73

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

Options:
A.

Hunt

B.

Mendax

C.

Alchemy Remote Executor

D.

Ettercap

Questions 74

Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

Options:
A.

Loopback

B.

Unicast

C.

Multicast

D.

Anycast

Questions 75

You work as a Network Administrator for a bank. For securing the bank's network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network. After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed. What type of response is the IDS giving?

Options:
A.

False Positive

B.

True Negative

C.

False Negative

D.

True Positive

Questions 76

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone. Which of the following commands will you use to accomplish the task?

Options:
A.

Dnscmd /config /enableglobalnamessupport 1

B.

Dnscmd /config /globalnamesqueryorder 0

C.

Dnscmd /config /enableglobalnames 1

D.

Dnscmd /config /enableglobalnamessupport 0

Questions 77

Which of the following tools detects certain types of packet filters and NAT setups?

Options:
A.

TShark

B.

Vulnerability scanner

C.

Wireshark

D.

Passive OS fingerprinting

Questions 78

Which of the following types of Intrusion Detection Systems consists of an agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state?

Options:
A.

PIDS

B.

APIDS

C.

HIDS

D.

NIDS

Questions 79

Which of the following libraries does TShark use to capture traffic from the first available network interface?

Options:
A.

dcap

B.

scap

C.

bcap

D.

pcap

Questions 80

The simplest form of a firewall is a packet filtering firewall. A packet filtering firewall filters packets at the Network layer and Transport layer. What are the types of information that are filtered at the Network layer of the OSI reference model?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

TCP/IP protocols

B.

IP addresses

C.

TCP and UDP port numbers

D.

TCP control flags

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.