Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GCFW GIAC Certified Firewall Analyst Questions and Answers

Questions 4

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

Options:

A.

Router Advertisement

B.

Neighbor Advertisement

C.

Router Solicitation

D.

Neighbor Solicitation

Buy Now
Questions 5

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Names of the victims

B.

Location of each incident

C.

Date and time of incident

D.

Nature of harassment

Buy Now
Questions 6

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

Options:

A.

Install a DMZ firewall

B.

Enable verbose logging on the firewall

C.

Install a host-based IDS

D.

Install a network-based IDS

Buy Now
Questions 7

You work as a Network Administrator for TechPerfect Inc. The company has a corporate intranet setup.

A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork. Which of the following steps will you take to accomplish the task?

Options:

A.

Block the ICMP protocol through ACL.

B.

Block the TCP protocol through ACL.

C.

Block the IPv6 protocol through ACL.

D.

Block the UDP protocol through ACL.

Buy Now
Questions 8

Which of the following statements about the traceroute utility are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection Systems.

B.

It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host.

C.

It records the time taken for a round trip for each packet at each router.

D.

It is an online tool that performs polymorphic shell code attacks.

Buy Now
Questions 9

Which of the following well-known ports is used by BOOTP ?

Options:

A.

UDP 69

B.

TCP 161

C.

TCP 21

D.

UDP 67

Buy Now
Questions 10

Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

Options:

A.

Application protocol-based intrusion detection system (APIDS)

B.

Network intrusion detection system (NIDS)

C.

Protocol-based intrusion detection system (PIDS)

D.

Host-based intrusion detection system (HIDS)

Buy Now
Questions 11

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

Options:

A.

ARP spoofing

B.

Replay attack

C.

Rainbow attack

D.

DoS attack

Buy Now
Questions 12

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Physical layer

B.

The Presentation layer

C.

The Network layer

D.

The Data-Link layer

Buy Now
Questions 13

You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

Options:

A.

Local-link

B.

Global unicast

C.

Site-local

D.

Loopback

Buy Now
Questions 14

Which of the following attacks sends false ICMP packets in an attempt to cripple a system using random fake Internet source addresses?

Options:

A.

Land attack

B.

SYN attack

C.

Replay attack

D.

Twinge attack

Buy Now
Questions 15

Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?

Options:

A.

WEP

B.

WPA

C.

L2TP

D.

IPSec

Buy Now
Questions 16

In which of the following conditions is the SYN Protector rule base activated in passive mode?

Options:

A.

When the number of SYN packets per second is equal to 13,425 (default)

B.

Only when the number of SYN packets per second is equal to the sum of the lower SYNs-persecond threshold and the upper SYNs-per-second threshold

C.

When the number of SYN packets per second is smaller than the sum of the lower SYNs-persecond threshold and the upper SYNs-per-second threshold

D.

When the number of SYN packets per second is greater than the sum of the lower SYNs-persecond threshold and the upper SYNs-per-second threshold

Buy Now
Questions 17

Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.

Which of the following protocols does the DCC use?

Options:

A.

ICMP

B.

UDP

C.

TELNET

D.

TCP

Buy Now
Questions 18

John works as the Security Manager for PassGuide Inc. He wants to create the Profiler database that stores information about the network activity at Layer 3, Layer 4, and Layer 7. Which of the following will he use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ignore connection

B.

Session creation

C.

Protocol contexts

D.

Session teardown

Buy Now
Questions 19

Which of the following Wireless LAN standard devices is least affected by interference from domestic appliances such as microwave ovens?

Options:

A.

802.11b

B.

802.11

C.

802.11a

D.

802.11g

Buy Now
Questions 20

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?

Options:

A.

LogIDS 1.0

B.

WIDS

C.

Snort 2.1.0

D.

NFR security

Buy Now
Questions 21

Which of the following statements are true about an IPv6 network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It uses longer subnet masks than those used in IPv4.

B.

It increases the number of available IP addresses.

C.

For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.

D.

It provides improved authentication and security.

E.

It uses 128-bit addresses.

Buy Now
Questions 22

Which of the following steps are generally followed in computer forensic examinations?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Encrypt

B.

Analyze

C.

Acquire

D.

Authenticate

Buy Now
Questions 23

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

Options:

A.

Session splicing attack

B.

Evasion attack

C.

Polymorphic shell code attack

D.

Insertion attack

Buy Now
Questions 24

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. You have searched all open ports of the we-are-secure server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of the following tools can you use to accomplish the task?

Options:

A.

Nmap

B.

NBTscan

C.

P0f

D.

Superscan

Buy Now
Questions 25

You work as a Security Administrator for Tech Perfect Inc. You have implemented and configured a web application security scanner in the company ' s network. It helps in the automated review of

the web applications with the defined purpose of discovering security vulnerabilities. In order to perform this task, the web application security scanner examines a number of vulnerabilities. What are these vulnerabilities?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Server configuration mistakes/errors/version

B.

Specific application problems

C.

Input/Output validation

D.

Denials of service against the TCP/IP stack

Buy Now
Questions 26

You are implementing passive OS fingerprinting in a network. Which of the following aspects are required to be configured there?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Edit signature vulnerable OS lists.

B.

Limit the attack relevance rating calculation to a specific IP address range.

C.

Define event action rules filters using the OS relevancy value of the target.

D.

Enable passive analysis.

E.

Define and import OS mappings.

Buy Now
Questions 27

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. You have recently come to know about the Slammer worm, which attacked computers in 2003 and doubled the number of infected hosts every 9 seconds or so. Slammer infected 75000 hosts in the first 10 minutes of the attack. To mitigate such security threats, you want to configure security tools on the network. Which of the following tools will you use?

Options:

A.

Intrusion Prevention Systems

B.

Firewall

C.

Anti-x

D.

Intrusion Detection Systems

Buy Now
Questions 28

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect ' s computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

Options:

A.

Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system

B.

Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces

C.

Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces

D.

Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

Buy Now
Questions 29

Which of the following attacking methods allows the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer by changing the Media Access Control address?

Options:

A.

IP address spoofing

B.

ARP spoofing

C.

MAC spoofing

D.

VLAN hoping

Buy Now
Questions 30

Which of the following number ranges is used for the IP Standard ACL?

Options:

A.

100-199

B.

1000-1099

C.

600-699

D.

1-99

Buy Now
Questions 31

You work as a Network Administrator for NetTech Inc. You want to prevent your network from Ping flood attacks. Which of the following protocols will you block to accomplish this task?

Options:

A.

IP

B.

PPP

C.

ICMP

D.

FTP

Buy Now
Questions 32

Which of the following devices is used to identify out-of-date software versions, applicable patches, system upgrades, etc?

Options:

A.

Retinal scanner

B.

Fingerprint reader

C.

Smart card reader

D.

Vulnerability scanner

Buy Now
Questions 33

A packet filtering firewall inspects each packet passing through the network and accepts or rejects it based on user-defined rules. Based on which of the following information are these rules set to filter the packets?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Layer 4 protocol information

B.

Actual data in the packet

C.

Interface of sent or received traffic

D.

Source and destination Layer 3 address

Buy Now
Questions 34

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

Options:

A.

PCAP

B.

WinPCap

C.

libpcap

D.

SysPCap

Buy Now
Questions 35

Which of the following types of IP actions are supported by an IDP rulebase?

Options:

A.

Initiate rules of the rulebase

B.

Drop/block session

C.

Close connection

D.

Notify

Buy Now
Questions 36

A remote-access VPN offers secured and encrypted connections between mobile or remote users and their corporate network across public networks. Which of the following does the remote-access VPN use for offering these types of connections?

Each correct answer represents a complete solution. Choose two.

Options:

A.

SSL

B.

IPsec

C.

TLS

D.

SSH

Buy Now
Questions 37

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

Which of the following tools can be used as a countermeasure to such an attack?

GCFW Question 37

Options:

A.

Kismet

B.

Absinthe

C.

SmashGuard

D.

Obiwan

Buy Now
Questions 38

Which of the following monitors program activities and modifies malicious activities on a system?

Options:

A.

Back door

B.

NIDS

C.

HIDS

D.

RADIUS

Buy Now
Questions 39

You work as a Firewall Analyst in the Tech Perfect Inc. The company has a Linux-based environment. You have installed and configured netfilter/iptables on all computer systems. What are the main features of netfilter/iptables?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It includes many plug-ins or modules in ' patch-o-matic ' repository

B.

It includes a number of layers of API ' s for third party extensions

C.

It offers stateless and stateful packet filtering with both IPv4 and IPv6 addressing schemes

D.

It provides network address and port address translations with both IPv4 and IPv6 addressing schemes

Buy Now
Questions 40

Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect ' s computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?

Options:

A.

Evidor

B.

WinHex

C.

Vedit

D.

HxD

Buy Now
Questions 41

WinDump, tcpdump, and Wireshark specify which fields of information libpcap should record.

Which of the following filters do they use in order to accomplish the task?

Options:

A.

Berkeley Packet Filter

B.

IM filter

C.

Web filter

D.

FIR filter

Buy Now
Questions 42

Which of the following is a valid IPv6 address?

Options:

A.

45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE

B.

45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE

C.

123.111.243.123

D.

45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

Buy Now
Questions 43

What are the advantages of stateless autoconfigration in IPv6?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

No server is needed for stateless autoconfiguration.

B.

No host configuration is necessary.

C.

It provides basic authentication to determine which systems can receive configuration data

D.

Ease of use.

Buy Now
Questions 44

You work as a Security Manger for Tech Perfect Inc. The company has a Windows-based network.

You want to scroll real-time network traffic to a command console in a readable format. Which of the following command line utilities will you use to accomplish the task?

Options:

A.

WinPcap

B.

WinDump

C.

iptables

D.

libpcap

Buy Now
Questions 45

You are the Network Administrator for a college. Wireless access is widely used at the college. You want the most secure wireless connections you can have. Which of the following would you use?

Options:

A.

WEP2

B.

WPA

C.

WPA2

D.

WEP

Buy Now
Questions 46

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP ' s DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command. Which of the following commands will you use?

Options:

A.

ping -a

B.

ping -l

C.

ping -n

D.

ping –t

Buy Now
Questions 47

Adam works on a Linux system. He is using Sendmail as the primary application to transmit e-mails. Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

Options:

A.

/log/var/logd

B.

/log/var/mailog

C.

/var/log/mailog

D.

/var/log/logmail

Buy Now
Questions 48

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

DES

B.

IDEA

C.

RC4

D.

Blowfish

Buy Now
Questions 49

Which of the following number ranges is used for the IPX Standard ACL?

Options:

A.

800-899

B.

1000-1099

C.

900-999

D.

1200-1299

Buy Now
Questions 50

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi- Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?

Options:

A.

Download and install new firmware patch for the router.

B.

Apply firewalls at appropriate spots.

C.

Apply a standard ACL on the router.

D.

Disable the SSID broadcast feature of the router.

Buy Now
Questions 51

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network ( VPN ) between the offices. Which of the following protocols is used by VPN for tunneling?

Options:

A.

HTTPS

B.

SSL

C.

IPSec

D.

L2TP

Buy Now
Questions 52

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small-sized packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack signatures of such attacks. Which of the following tools can be used to perform session splicing attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Whisker

B.

Fragroute

C.

Nessus

D.

Y.A.T.

Buy Now
Questions 53

Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

Options:

A.

Snort

B.

SUDO

C.

Apache

D.

SSH

Buy Now
Questions 54

Which of the following IPv4 fields become obsolete while removing the hop-by-hop segmentation (fragmentation) procedure from the IP header?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Datagram Identification Number field

B.

Fragment Offset field

C.

Datagram Length field

D.

Flags field

Buy Now
Questions 55

Which of the following TShark options is used to set capture buffer size in MB?

Options:

A.

-F

B.

-G

C.

-C

D.

-B

Buy Now
Questions 56

John works as a Network Administrator for Web Perfect Inc. The company has a wireless LAN network. John has configured shared key authentication on a client. The client and the AP start exchanging the frames to enable authentication. Which of the following vulnerabilities may occur while the client and the AP exchange the challenge text over the wireless link?

Options:

A.

DoS attack

B.

Land attack

C.

Vulnerability attack

D.

Man-in-the-middle attack

Buy Now
Questions 57

Which of the following are open-source vulnerability scanners?

Options:

A.

Nikto

B.

Hackbot

C.

NetRecon

D.

Nessus

Buy Now
Questions 58

Fill in the blank with the appropriate tool name.

______________ is a network protocol analyzer tool that is used to capture packet data from an existing network or examine packet data from a pre-saved file.

Options:

Buy Now
Questions 59

Which of the following is used as a default port by the TELNET utility?

Options:

A.

80

B.

20

C.

21

D.

23

Buy Now
Questions 60

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

l It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.

l It is commonly used for the following purposes:

a. War driving

b. Detecting unauthorized access points

c. Detecting causes of interference on a WLAN

d. WEP ICV error tracking

e. Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

Options:

A.

NetStumbler

B.

Kismet

C.

THC-Scan

D.

Absinthe

Buy Now
Questions 61

Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?

Options:

A.

iptables

B.

WinPcap

C.

Netfilter

D.

tcpdump

Buy Now
Questions 62

Which of the following vulnerability scanners is used to test Web servers for dangerous files/CGIs, outdated server software, and other problems?

Options:

A.

Nikto

B.

Hackbot

C.

Nmap

D.

Nessus

Buy Now
Questions 63

Adam works as a Security administrator for Umbrella Inc. He runs the following traceroute and notices that hops 19 and 20 both show the same IP address.

1 172.16.1.254 (172.16.1.254) 0.724 ms 3.285 ms 0.613 ms 2 ip68-98-176-

1.nv.nv.cox.net (68.98.176.1) 12.169 ms 14.958 ms 13.416 ms 3 ip68-98-176-

1.nv.nv.cox.net (68.98.176.1) 13.948 ms ip68-100-0-1.nv.nv. cox.net (68.100.0.1)

16.743 ms 16.207 ms 4 ip68-100-0-137.nv.nv.cox.net (68.100.0.137) 17.324 ms 13.933

ms 20.938 ms 5 68.1.1.4 (68.1.1.4) 12.439 ms 220.166 ms 204.170 ms

6 so-6-0-0.gar2.wdc1.Level3.net (67.29.170.1) 16.177 ms 25.943 ms 14.104 ms 7

unknown.Level3.net (209.247.9.173) 14.227 ms 17.553 ms 15.415 ms " PassGuide " -

8 so-0-1-0.bbr1.NewYork1.level3.net (64.159.1.41) 17.063 ms 20.960 ms 19.512 ms 9

so-7-0-0.gar1. NewYork1.Level3.net (64.159.1.182) 20.334 ms 19.440 ms 17.938 ms

10 so-4-0-0.edge1.NewYork1.Level3.

net (209.244.17.74) 27.526 ms 18.317 ms 21.202 ms 11 uunet-level3-

oc48.NewYork1.Level3.net

(209.244.160.12) 21.411 ms 19.133 ms 18.830 ms 12 0.so-6-0-0.XL1.NYC4.ALTER.NET

(152.63.21.78)

21.203 ms 22.670 ms 20.111 ms 13 0.so-2-0-0.TL1.NYC8.ALTER.NET (152.63.0.153)

30.929 ms 24.858 ms

23.108 ms 14 0.so-4-1-0.TL1.ATL5.ALTER.NET (152.63.10.129) 37.894 ms 33.244 ms

33.910 ms 15 0.so-7-0-0.XL1.MIA4.ALTER.NET (152.63.86.189) 51.165 ms 49.935 ms

49.466 ms 16 0.so-3-0-0.XR1.MIA4.ALTER.

NET (152.63.101.41) 50.937 ms 49.005 ms 51.055 ms 17 117.ATM6-

0.GW5.MIA1.ALTER.NET (152.63.82.73) 51.897 ms 50.280 ms 53.647 ms 18 PassGuidegw1.

customer.alter.net (65.195.239.14) 51.921 ms 51.571 ms 56.855 ms 19

www.PassGuide.com (65.195.239.22) 52.191 ms 52.571 ms 56.855 ms 20

www.PassGuide.com (65.195.239.22) 53.561 ms 54.121 ms 58.333 ms

Which of the following is the most like cause of this issue?

Options:

A.

A stateful inspection firewall

B.

An application firewall

C.

Network Intrusion system

D.

Intrusion Detection System

Buy Now
Questions 64

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WPA with 802.1X authentication

B.

WPA with Pre Shared Key

C.

WEP

D.

WPA

Buy Now
Questions 65

Which of the following limits the number of packets seen by tcpdump?

Options:

A.

BPF-based filter

B.

Recipient filtering

C.

Sender filtering

D.

IFilters

Buy Now
Questions 66

Which of the following is like a malicious cache poisoning where fake data is placed in the cache of the name servers?

Options:

A.

Smurf attack

B.

Host name spoofing

C.

DNS spoofing

D.

SYN flood attack

Buy Now
Questions 67

As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com. Which of the following nmap switches have you used to accomplish the task?

Options:

A.

nmap -sT

B.

nmap -vO

C.

nmap -sS

D.

nmap –sO

Buy Now
Questions 68

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Application-level firewall

B.

Stateful inspection firewall

C.

Packet filtering firewall

D.

Circuit-level firewall

Buy Now
Questions 69

Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

Options:

A.

Man-in-the-middle

B.

Port scanning

C.

Session hijacking

D.

ARP spoofing

Buy Now
Questions 70

Which of the following features does the Nmap utility have?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It has a stealth approach to scanning and sweeping.

B.

It identifies services running on systems in a specified range of IP addresses using scanning and sweeping feature.

C.

It uses operating system fingerprinting technology to identify the operating system running on a target system.

D.

It is a location where an organization can easily view the event of a disaster, such as fire, flood, terrorist threat, or other disruptive events.

Buy Now
Questions 71

Which of the following attacks generates falsified information within an IP header?

Options:

A.

DNS spoofing attack

B.

IP spoofing attack

C.

Web spoofing attack

D.

ARP spoofing attack

Buy Now
Questions 72

Which of the following applications cannot proactively detect anomalies related to a computer?

Options:

A.

NIDS

B.

Anti-virus scanner

C.

Firewall installed on the computer

D.

HIDS

Buy Now
Questions 73

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Prepare a chain of custody and handle the evidence carefully.

B.

Follow the rules of evidence and never temper with the evidence.

C.

Never exceed the knowledge base of the forensic investigation.

D.

Examine original evidence and never rely on the duplicate evidence.

Buy Now
Questions 74

Which of the following group management messages is used by routers to handle the IPv6 multicast routing?

Options:

A.

OSPF

B.

IGMP

C.

ARP

D.

ICMPv6

Buy Now
Questions 75

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Mendax

B.

Fragroute

C.

Tcpdump

D.

Ettercap

Buy Now
Questions 76

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. A Cisco switch is configured on the network. You change the original host name of the switch through the hostname command. The prompt displays the changed host name. After some time, power of the switch went off due to some reason. When power restored, you find that the prompt is displaying the old host name. What is the most likely cause?

Options:

A.

The changes were saved in running-config file.

B.

The startup-config file got corrupted.

C.

The running-config file got corrupted.

D.

Host name cannot be changed permanently once switch is configured.

Buy Now
Questions 77

What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?

Options:

A.

Use the TRACERT command with the /pingname parameter.

B.

Ping the source host with its computer name.

C.

Ping the source host with its IP address.

D.

Check the IP statistics on the file server.

Buy Now
Questions 78

Which of the following are the reasons that network administrators use Access Control Lists?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Encrypting data to be routed

B.

Removing weak user password

C.

Controlling VTY access into a router

D.

Filtering traffic as it passes through a router

Buy Now
Questions 79

A scenario involves a pool of users with private IP addresses who need to access the Internet; however, the company has a limited number of IP addresses and needs to ensure users occupy only one public IP address.

Which technology is used to allow a pool of users to share one global IP address for Internet access?

Options:

A.

Port Address Translation

B.

Per-user Address Translation

C.

Pool Address Translation

D.

Private Address Translation

Buy Now
Questions 80

Which of the following is the default port for POP3 ?

Options:

A.

25

B.

21

C.

80

D.

110

Buy Now
Questions 81

You are configuring a public access wireless connection. Which of the following is the best way to secure this connection?

Options:

A.

Not broadcasting SSID

B.

Using WPA encryption

C.

Implementing anti virus

D.

Using MAC filtering

Buy Now
Questions 82

In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?

Options:

A.

Fragmentation overwrite

B.

Fragmentation overlap

C.

Insertion

D.

Session splicing

Buy Now
Questions 83

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the preattack phase:

l Information gathering

l Determining network range

l Identifying active machines

l Finding open ports and applications

l OS fingerprinting

l Fingerprinting services

Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ettercap

B.

Traceroute

C.

NeoTrace

D.

Cheops

Buy Now
Questions 84

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

Options:

A.

ACL

B.

IPsec

C.

Firewall

D.

NAT

Buy Now
Questions 85

Adam works as a Network Administrator for PassGuide Inc. He wants to prevent the network from DOS attacks. Which of the following is most useful against DOS attacks?

Options:

A.

Distributive firewall

B.

Honey Pot

C.

SPI

D.

Internet bot

Buy Now
Questions 86

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cookies folder

B.

Temporary Internet Folder

C.

Download folder

D.

History folder

Buy Now
Questions 87

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.

Signature-based

B.

Network-based

C.

Anomaly-based

D.

File-based

Buy Now
Questions 88

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

Options:

A.

Replay attack

B.

ARP spoofing

C.

DoS attack

D.

Rainbow attack

Buy Now
Questions 89

You work as a Network Architect for Tech Perfect Inc. The company has a TCP/IP based network. You have established a remote-access VPN network between mobile users and the company ' s network. You want to implement the following features in the remote-access VPN network:

l Provide security for the web traffic.

l Browser clients can support the VPN connection to a host.

Which of the following will you configure to implement the given features in the network?

Options:

A.

IPsec

B.

SSL

C.

DACL

D.

SSH

Buy Now
Questions 90

Which of the following is a Cisco IOS management term described in the statement below?

" It is the fourth digit in the configuration register and contains a hexadecimal value. The bootstrap program uses its value to choose which operating system to load into RAM. "

Options:

A.

Boot check

B.

Boot field

C.

Boot

D.

Boot value

Buy Now
Questions 91

Which of the following terms is used to represent IPv6 addresses?

Options:

A.

Hexadecimal-dot notation

B.

Colon-hexadecimal

C.

Colon-dot

D.

Dot notation

Buy Now
Questions 92

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

Options:

A.

Neighbor Advertisement

B.

Neighbor Solicitation

C.

Router Solicitation

D.

Router Advertisement

Buy Now
Questions 93

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:

A.

IPChains

B.

OpenSSH

C.

Stunnel

D.

IPTables

Buy Now
Questions 94

Passive OS fingerprinting (POSFP) is configured in an organization ' s network in order to improve the alert output by reporting some information. Which of the following information does it include?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Source of the OS identification

B.

Relevancy to the victim in the alert

C.

Network security device

D.

Victim OS

Buy Now
Questions 95

Which of the following is a version of netcat with integrated transport encryption capabilities?

Options:

A.

Encat

B.

Nikto

C.

Cryptcat

D.

Socat

Buy Now
Questions 96

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf( " %s " , str).

What attack will his program expose the Web application to?

Options:

A.

Sequence++ attack

B.

SQL injection attack

C.

Cross Site Scripting attack

D.

Format string attack

Buy Now
Questions 97

Which of the following devices works as a transparent bridge between the wireless clients and the wired network?

Options:

A.

Access point

B.

Hub

C.

Switch

D.

Wireless router

Buy Now
Questions 98

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Follow the rules of evidence and never temper with the evidence.

B.

Examine original evidence and never rely on the duplicate evidence.

C.

Never exceed the knowledge base of the forensic investigation.

D.

Prepare a chain of custody and handle the evidence carefully.

Buy Now
Questions 99

Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-topeer attacks when the laptops are used in public access network?

Options:

A.

Use protocol analyzer

B.

Use firewall

C.

Use Port Address Translation

D.

Use security protocols

Buy Now
Questions 100

Which of the following files is a Cisco IOS configuration files that resides in RAM?

Options:

A.

running-config

B.

startup-config

C.

temp-config

D.

ram-config

Buy Now
Questions 101

Which of the following is a Windows-based tool used for packet analysis?

Options:

A.

WinPcap

B.

AirPcap

C.

Tcpdump

D.

WinDump

Buy Now
Questions 102

Fill in the blank with the appropriate utility.

________ is a table-based system or structure that defines the rulesets needed to transform or filter network packets.

Options:

Buy Now
Questions 103

The simplest form of a firewall is a packet filtering firewall. A packet filtering firewall filters packets at the Network layer and Transport layer. What are the types of information that are filtered at the Network layer of the OSI reference model?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

TCP/IP protocols

B.

TCP control flags

C.

IP addresses

D.

TCP and UDP port numbers

Buy Now
Questions 104

Which of the following tools is used to detect spam email without checking the content?

Options:

A.

Sniffer

B.

DCC

C.

EtherApe

D.

Kismet

Buy Now
Questions 105

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.

You have configured an 802.11g Wireless LAN ( WLAN ) on your network. Which of the following factors can deteriorate the performance and range of the WLAN?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Concrete walls

B.

Fiberglass partitions

C.

Metal ceilings

D.

Cordless phones

Buy Now
Questions 106

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-inthe- middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the Weare- secure server?

Options:

A.

Diffie-Hellman

B.

Blowfish

C.

RSA

D.

Twofish

Buy Now
Questions 107

Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?

Options:

A.

0

B.

1

C.

F

D.

2

Buy Now
Questions 108

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf( " %s " , str).

What attack will his program expose the Web application to?

Options:

A.

Cross Site Scripting attack

B.

SQL injection attack

C.

Format string attack

D.

Sequence++ attack

Buy Now
Questions 109

Which of the following techniques correlates information found on multiple hard drives?

Options:

A.

Cross-drive analysis

B.

Data analysis

C.

Live analysis

D.

Gap analysis

Buy Now
Questions 110

Which of the following address translation types only translates one (and only one) IP address to another without using ports?

Options:

A.

NAT

B.

Dynamic NAT

C.

PAT

D.

Static NAT

Buy Now
Questions 111

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter?

Options:

A.

PIX firewall

B.

Virtual firewall

C.

Stateful packet filter firewall

D.

Stateless packet filter firewall

Buy Now
Questions 112

Which of the following tools detects certain types of packet filters and NAT setups?

Options:

A.

TShark

B.

Vulnerability scanner

C.

Wireshark

D.

Passive OS fingerprinting

Buy Now
Questions 113

Which of the following vulnerability scanners is used to test Web servers for dangerous files/CGIs, outdated server software, and other problems?

Options:

A.

Nikto

B.

Nmap

C.

Hackbot

D.

Nessus

Buy Now
Questions 114

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company ' s network. You have to configure your company ' s router for it. By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

443

B.

80

C.

22

D.

21

Buy Now
Questions 115

You work as a Network Adminstrator at PassGuide Inc. You want to implement a solution that will automatically disallow connections if an attack is suspected. Which of the following technologies will you choose to accomplish the task?

Options:

A.

ACL

B.

IPS

C.

SRTP

D.

IIS

Buy Now
Questions 116

Which of the following is the module of OpenSER?

Options:

A.

Sipsak

B.

TShark

C.

WireShark

D.

SipTrace

Buy Now
Questions 117

In which of the following attacks does an attacker change the MAC address on the sniffer to one that is the same in another system on the local subnet?

Options:

A.

ARP spoofing

B.

MAC flooding

C.

IP spoofing

D.

MAC duplicating

Buy Now
Exam Code: GCFW
Exam Name: GIAC Certified Firewall Analyst
Last Update: Apr 30, 2026
Questions: 391

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now GCFW testing engine

PDF (Q&A)

$43.57  $124.49
buy now GCFW pdf