Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFW Practice Exam with Questions & Answers | Set: 9

Questions 81

Sam works as a Security Manager for GenTech Inc. He has been assigned a project to detect reconnoitering activities. For this purpose, he has deployed a system in the network that attracts the attention of an attacker. Which of the following rulebases will he use to accomplish the task?

Options:
A.

Backdoor rulebase

B.

Exempt rulebase

C.

Network Honeypot rulebase

D.

SYN Protector rulebase

GIAC GCFW Premium Access
Questions 82

Which of the following are packet filtering tools for the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Zone Alarm

B.

BlackICE

C.

IPFilter

D.

IPTables

Questions 83

Which of the following is used as a default port by the TELNET utility?

Options:
A.

80

B.

20

C.

21

D.

23

Questions 84

Which of the following actions can be taken as the countermeasures against the ARP spoofing attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Placing static ARP entries on servers and routers

B.

Looking for large amount of ARP traffic on local subnets

C.

Using Private VLANs

D.

Using 8 digit passwords for authentication

Questions 85

Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Under which of the following controls does audit control come?

Options:
A.

Protective controls

B.

Preventive controls

C.

Detective controls

D.

Reactive controls

Questions 86

An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network. Which of the following processes does an IDS perform?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Monitoring and analysis of user and system activity

B.

Event log analysis

C.

Network traffic analysis

D.

Statistical analysis of abnormal traffic patterns

Questions 87

Which of the following vulnerability scanners detects vulnerabilities by actually performing attacks?

Options:
A.

Network enumerator

B.

Computer worm

C.

Port scanner

D.

Web application security scanner

Questions 88

Which of the following devices works as a transparent bridge between the wireless clients and the wired network?

Options:
A.

Access point

B.

Hub

C.

Switch

D.

Wireless router

Questions 89

You run the tcpdump command line utility and get a report produced by tcpdump. What information does this report include?

Each correct answer represents a complete solution. Choose three.

Options:
A.

Packets dropped by kernel

B.

Packets discarded

C.

Packets captured

D.

Packets received by filter

Questions 90

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Options:
A.

Cain

B.

PsExec

C.

PsList

D.

Fpipe

GIAC Related Exams

How to pass GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test Exam
How to pass GIAC GCPM - GIAC Certified Project Manager Certification Practice Test Exam
How to pass GIAC GISF - GIAC Information Security Fundamentals Exam
How to pass GIAC GISP - GIAC Information Security Professional Exam
How to pass GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET Exam
How to pass GIAC GSSP-Java - GIAC Secure Software Programmer – Java Exam
How to pass GIAC GSSP-NET-CSHARP - GIAC GIAC Secure Software Programmer - C#.NET Exam

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.