Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

GCFW Sample Questions Answers

Questions 4

Which of the following responsibilities does not come under the audit process?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Reporting all facts and circumstances of the irregular and illegal acts.

B.

Reviewing the results of the audit procedures.

C.

Planning the IT audit engagement based on the assessed level of risk.

D.

Applying security policies.

Buy Now
Questions 5

Which of the following devices are used to implement Network Address Translation (NAT)?

Options:

A.

Routers and firewalls

B.

Firewalls and file servers

C.

Switches and firewalls

D.

Routers and switches

Buy Now
Questions 6

Which of the following are packet filtering tools for the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Zone Alarm

B.

BlackICE

C.

IPFilter

D.

IPTables

Buy Now
Questions 7

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Prepare a chain of custody and handle the evidence carefully.

B.

Examine original evidence and never rely on the duplicate evidence.

C.

Follow the rules of evidence and never temper with the evidence.

D.

Never exceed the knowledge base of the forensic investigation.

Buy Now
Questions 8

Which of the following libraries does TShark use to capture traffic from the first available network interface?

Options:

A.

dcap

B.

scap

C.

bcap

D.

pcap

Buy Now
Questions 9

Which of the following fields are specified when rules are created for the Network Honeypot

rulebase?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A destination/service match condition

B.

Detection settings

C.

Operation mode

D.

Response options

Buy Now
Questions 10

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Tcpdump

B.

Ettercap

C.

Fragroute

D.

Mendax

Buy Now
Questions 11

You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices. What will you do?

Options:

A.

Implement an ACL.

B.

Implement a firewall.

C.

Implement a dynamic NAT.

D.

Implement a WIPS.

Buy Now
Questions 12

Which of the following well-known ports is used by BOOTP?

Options:

A.

UDP 69

B.

TCP 161

C.

TCP 21

D.

UDP 67

Buy Now
Questions 13

An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network. Which of the following processes does an IDS perform?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Event log analysis

B.

Monitoring and analysis of user and system activity

C.

Statistical analysis of abnormal traffic patterns

D.

Network traffic analysis

Buy Now
Questions 14

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

Options:

A.

These are the threats that originate from within the organization.

B.

These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

C.

These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

D.

These are the threats intended to flood a network with large volumes of access requests.

Buy Now
Questions 15

Adam works as a Network Administrator for PassGuide Inc. He wants to prevent the network from DOS attacks. Which of the following is most useful against DOS attacks?

Options:

A.

Distributive firewall

B.

Honey Pot

C.

SPI

D.

Internet bot

Buy Now
Questions 16

John works as the Security Manager in PassGuide Inc. He wants to protect his network from a variant of the Denial-of-Service (DoS) attack. When the rulebase is enabled for protection, the IDP engine checks the traffic that exceeds the traffic thresholds. Which of the following rulebases is used for this purpose?

Options:

A.

Exempt rulebase

B.

SYN Protector rulebase

C.

Traffic Anomalies rulebase

D.

Backdoor rulebase

Buy Now
Questions 17

Sam works as a Security Manager for Gentech Inc. The company has a Windows-based network. Sam wants to prevent specific traffic from IDP processing in order to reduce false positives. Which of the following rulebases will he use to accomplish the task?

Options:

A.

SYN Protector rulebase

B.

Network Honeypot rulebase

C.

Exempt rulebase

D.

Backdoor rulebase

Buy Now
Questions 18

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

443

B.

80

C.

22

D.

21

Buy Now
Questions 19

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

Options:

A.

Router Advertisement

B.

Neighbor Advertisement

C.

Router Solicitation

D.

Neighbor Solicitation

Buy Now
Questions 20

You work as a Network Troubleshooter for PassGuide Inc. You want to tunnel the IPv6 traffic across an IPv4 supporting portion of the company's network. You are using the interface configuration mode for the tunnel. Which of the following IP addresses will you enter after the tunnel source command?

Options:

A.

The IPv4 address assigned to the local interface on which the tunnel is built

B.

The IPv4 address assigned to the remote interface on which the tunnel is built

C.

The IPv6 address assigned to the local tunnel interface

D.

The IPv6 address assigned to the remote tunnel interface

Buy Now
Questions 21

You work as a Security Manger for Tech Perfect Inc. The company has a Windows-based network.

You want to scroll real-time network traffic to a command console in a readable format. Which of the following command line utilities will you use to accomplish the task?

Options:

A.

WinPcap

B.

WinDump

C.

iptables

D.

libpcap

Buy Now
Questions 22

Which of the following is the function of the editcap utility of Wireshark?

Options:

A.

To check data packets

B.

To transfer data packets

C.

To analyze data packets

D.

To remove duplicate packets

Buy Now
Questions 23

Fill in the blank with the appropriate utility.

________ is a table-based system or structure that defines the rulesets needed to transform or filter network packets.

Options:

Buy Now
Questions 24

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

Options:

A.

Biometric device

B.

Man trap

C.

Host Intrusion Detection System (HIDS)

D.

Network Intrusion Detection System (NIDS)

Buy Now
Questions 25

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command. Which of the following commands will you use?

Options:

A.

ping -a

B.

ping -l

C.

ping -n

D.

ping –t

Buy Now
Questions 26

Which of the following modes is also referred to as client mode?

Options:

A.

Ad-hoc mode

B.

Master mode

C.

Manage mode

D.

Monitor mode

Buy Now
Questions 27

Which of the following is a hardware/software platform that is designed to analyze, detect and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

Options:

A.

NIPS

B.

HIPS

C.

NIDS

D.

HIDS

Buy Now
Questions 28

A Proxy firewall, also known as Application Gateway Firewall, filters information at which of the following layers of the OSI reference model?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Transport layer

B.

Presentation layer

C.

Physical layer

D.

Application layer

Buy Now
Questions 29

Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a remote location and a public IPv4 address, instead of public IPv6 address, has been assigned to the computer?

Options:

A.

Teredo

B.

PortProxy

C.

6to4

D.

ISATAP

Buy Now
Questions 30

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be most helpful against Denial of Service (DOS) attacks?

Options:

A.

Stateful Packet Inspection (SPI) firewall

B.

Packet filtering firewall

C.

Network surveys.

D.

Honey pot

Buy Now
Questions 31

Sam works as a Security Manager for GenTech Inc. He has been assigned a project to detect reconnoitering activities. For this purpose, he has deployed a system in the network that attracts the attention of an attacker. Which of the following rulebases will he use to accomplish the task?

Options:

A.

Backdoor rulebase

B.

Exempt rulebase

C.

Network Honeypot rulebase

D.

SYN Protector rulebase

Buy Now
Questions 32

Which of the following TShark options is used to set capture buffer size in MB?

Options:

A.

-F

B.

-G

C.

-C

D.

-B

Buy Now
Questions 33

A Proxy firewall, also known as Application Gateway Firewall, filters information at which of the following layers of the OSI reference model?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Transport layer

B.

Physical layer

C.

Presentation layer

D.

Application layer

Buy Now
Questions 34

Which of the following statements about Access control list (ACL) is true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Extended IP Access Control List permits or denies packets only from a specific source IP addresses.

B.

Standard IP Access Control List permits or denies packets only from specific source IP addr esses.

C.

Standard IP Access Control List can be used to permit or deny traffic from a specific source IP addresses or for a specific destination IP address, and port.

D.

Extended IP Access Control List permits or denies traffic from a specific source IP addresses or for a specific destination IP address, and port.

E.

Access control list filters packets or network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces.

Buy Now
Questions 35

Which of the following is a console-based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system?

Options:

A.

Hping2

B.

Nemesis

C.

Scapy

D.

Kismet

Buy Now
Questions 36

Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?

Options:

A.

IPS

B.

HIDS

C.

DMZ

D.

NIDS

Buy Now
Questions 37

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi- Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?

Options:

A.

Download and install new firmware patch for the router.

B.

Apply firewalls at appropriate spots.

C.

Apply a standard ACL on the router.

D.

Disable the SSID broadcast feature of the router.

Buy Now
Questions 38

John works as a Security Manager for Gentech Inc. The company has a Windows-based network.

John has been assigned a project to detect the services used by an attack to access the network.

For this purpose, he is required to use the predefined service objects of the rulebase. This predefined service object defines the services used in the attack to access the network. Which of the following objects will he create when he finds that the attack is not defined in the predefined service objects?

Options:

A.

Custom service objects

B.

Signature attack objects

C.

Protocol anomaly attack objects

D.

Compound attack objects

Buy Now
Questions 39

You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices. What will you do?

Options:

A.

Implement a dynamic NAT.

B.

Implement a firewall.

C.

Implement an ACL.

D.

Implement a WIPS.

Buy Now
Questions 40

Which of the following can provide security against man-in-the-middle attack?

Options:

A.

Anti-virus programs

B.

Strong data encryption during travel

C.

Strong authentication method

D.

Firewall

Buy Now
Questions 41

You work as a Network Administrator for TechPerfect Inc. The company has a corporate intranet setup.

A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork. Which of the following steps will you take to accomplish the task?

Options:

A.

Block the IPv6 protocol through ACL.

B.

Block the UDP protocol through ACL.

C.

Block the TCP protocol through ACL.

D.

Block the ICMP protocol through ACL.

Buy Now
Questions 42

Which of the following is used to provide hook handling facility within the Linux kernel in order to capture and manipulate network packets?

Options:

A.

Tcpdump

B.

WinDump

C.

Netfilter

D.

WinPcap

Buy Now
Questions 43

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter?

Options:

A.

PIX firewall

B.

Virtual firewall

C.

Stateful packet filter firewall

D.

Stateless packet filter firewall

Buy Now
Questions 44

Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

Options:

A.

Dynamic NAT

B.

Cache NAT

C.

Port Address Translation (PAT)

D.

Static NAT

Buy Now
Questions 45

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

Options:

A.

Social engineering

B.

Smurf

C.

Denial-of-Service

D.

Man-in-the-middle

Buy Now
Questions 46

You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer. While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command. What is the cause of the issue?

Options:

A.

Windows Firewall blocks the command line tools.

B.

Core Networking Firewall rules do not allow IPv4 or IPv6.

C.

Core Networking Firewall rules do not allow ICMPv4 or ICMPv6 Echo Requests.

D.

Windows Firewall rules do not allow Core Networking Tools.

Buy Now
Questions 47

Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-topeer attacks when the laptops are used in public access network?

Options:

A.

Use protocol analyzer

B.

Use Port Address Translation

C.

Use security protocols

D.

Use firewall

Buy Now
Questions 48

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

portsentry

B.

nmap

C.

libnids

D.

scanlogd

Buy Now
Questions 49

Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Under which of the following controls does audit control come?

Options:

A.

Protective controls

B.

Preventive controls

C.

Detective controls

D.

Reactive controls

Buy Now
Questions 50

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the preattack phase:

l Information gathering

l Determining network range

l Identifying active machines

l Finding open ports and applications

l OS fingerprinting

l Fingerprinting services

Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ettercap

B.

Traceroute

C.

NeoTrace

D.

Cheops

Buy Now
Questions 51

Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Ping of Death attack

B.

SYN flood attack

C.

Teardrop attack

D.

Land attack

Buy Now
Questions 52

You want to create a binary log file using tcpdump. Which of the following commands will you use?

Options:

A.

tcpdump -B

B.

tcpdump -w

C.

tcpdump -dd

D.

tcpdump -d

Buy Now
Questions 53

Which of the following group management messages is used by routers to handle the IPv6 multicast routing?

Options:

A.

OSPF

B.

IGMP

C.

ARP

D.

ICMPv6

Buy Now
Questions 54

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

Options:

A.

Active IDS

B.

Network-based IDS

C.

Signature-based IDS

D.

Passive IDS

Buy Now
Questions 55

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Names of the victims

B.

Location of each incident

C.

Nature of harassment

D.

Date and time of incident

Buy Now
Questions 56

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

Options:

A.

Network Intrusion Detection System (NIDS)

B.

Host Intrusion Detection System (HIDS)

C.

Biometric device

D.

Man trap

Buy Now
Questions 57

Host-based IDS (HIDS) is an Intrusion Detection System that runs on the system to be monitored.

HIDS monitors only the data that it is directed to, or originates from the system on which HIDS is installed. Besides monitoring network traffic for detecting attacks, it can also monitor other parameters of the system such as running processes, file system access and integrity, and user logins for identifying malicious activities. Which of the following tools are examples of HIDS?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Legion

B.

BlackIce Defender

C.

Tripwire

D.

HPing

Buy Now
Questions 58

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

Options:

A.

Hunt

B.

Ettercap

C.

Alchemy Remote Executor

D.

Mendax

Buy Now
Questions 59

Which of the following vulnerability scanners detects vulnerabilities by actually performing attacks?

Options:

A.

Network enumerator

B.

Computer worm

C.

Port scanner

D.

Web application security scanner

Buy Now
Questions 60

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

Options:

A.

Fragmentation overwrite attack

B.

Insertion attack

C.

Fragmentation overlap attack

D.

Evasion attack

Buy Now
Questions 61

Which of the following can provide security against man-in-the-middle attack?

Options:

A.

Firewall

B.

Strong authentication method

C.

Strong data encryption during travel

D.

Anti-virus programs

Buy Now
Questions 62

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.

Signature-based

B.

Network-based

C.

Anomaly-based

D.

File-based

Buy Now
Questions 63

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Application-level firewall

B.

Stateful inspection firewall

C.

Circuit-level firewall

D.

Packet filtering firewall

Buy Now
Questions 64

Which of the following terms is used to represent IPv6 addresses?

Options:

A.

Hexadecimal-dot notation

B.

Colon-hexadecimal

C.

Colon-dot

D.

Dot notation

Buy Now
Questions 65

Which of the following ports cannot be used to access the router from a computer?

Options:

A.

Serial port

B.

Vty

C.

Aux port

D.

Console port

Buy Now
Questions 66

Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

Options:

A.

Netresident

B.

Snort

C.

Wireshark

D.

NetWitness

Buy Now
Questions 67

Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

Options:

A.

Snort

B.

SUDO

C.

Apache

D.

SSH

Buy Now
Questions 68

Which of the following tools is used to detect spam email without checking the content?

Options:

A.

Sniffer

B.

DCC

C.

EtherApe

D.

Kismet

Buy Now
Questions 69

Which of the following steps are generally followed in computer forensic examinations?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Encrypt

B.

Analyze

C.

Acquire

D.

Authenticate

Buy Now
Questions 70

You work as a Network Administrator for TechPerfect Inc. The company has a corporate intranet setup.

A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork. Which of the following steps will you take to accomplish the task?

Options:

A.

Block the ICMP protocol through ACL.

B.

Block the TCP protocol through ACL.

C.

Block the IPv6 protocol through ACL.

D.

Block the UDP protocol through ACL.

Buy Now
Questions 71

Which of the following is an attack with IP fragments that cannot be reassembled?

Options:

A.

Dictionary attack

B.

Smurf attack

C.

Teardrop attack

D.

Password guessing attack

Buy Now
Questions 72

John works as a Security Manager for Gentech Inc. He uses an IDP engine to detect the type of interactive traffic produced during an attack in which the attacker wants to install the mechanism on a host system that facilitates the unauthorized access and breaks the system confidentiality.

Which of the following rulebases will he use to accomplish the task?

Options:

A.

Backdoor rulebase

B.

Traffic Anomalies rulebase

C.

Exempt rulebase

D.

SYN Protector rulebase

Buy Now
Questions 73

Which of the following techniques is used to identify attacks originating from a botnet?

Options:

A.

BPF-based filter

B.

Recipient filtering

C.

IFilter

D.

Passive OS fingerprinting

Buy Now
Questions 74

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP network. You have been assigned a task to configure a stateful packet filtering firewall to secure the network of the company. You are encountering some problems while configuring the stateful packet filtering firewall. Which of the following can be the reasons for your problems?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It has limited logging capabilities.

B.

It has to open up a large range of ports to allow communication.

C.

It is complex to configure.

D.

It contains additional overhead of maintaining a state table.

Buy Now
Questions 75

Which of the following statements about a host-based intrusion prevention system (HIPS) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It can handle encrypted and unencrypted traffic equally.

B.

It cannot detect events scattered over the network.

C.

It can detect events scattered over the network.

D.

It is a technique that allows multiple computers to share one or more IP addresses.

Buy Now
Questions 76

Which of the following types of audit constructs a risk profile for existing and new projects?

Options:

A.

Innovative comparison audit

B.

Client/Server, Telecommunications, Intranets, and Extranets audits

C.

Technological position audit

D.

Technological innovation process audit

Buy Now
Questions 77

You work as a Network Architect for Tech Perfect Inc. The company has a corporate LAN network. You will have to perform the following tasks:

l Limit events that occur from security threats such as viruses, worms, and spyware.

l Restrict access to the network based on identity or security posture.

Which of the following services will you deploy in the network to accomplish the tasks?

Options:

A.

NetFlow

B.

Protocol-Independent Multicast

C.

Network Admission Control

D.

Firewall Service Module

Buy Now
Questions 78

Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?

Options:

A.

Evidor

B.

WinHex

C.

Vedit

D.

HxD

Buy Now
Questions 79

Choose the best explanation for the resulting error when entering the command below.

Options:

A.

The command is attempting to create a standard access list with extended access list param eters.

B.

The ACL commands should be entered from the (config-router) configuration mode.

C.

The wildcard mask is not provided for the source and destination addresses.

D.

The port number given does not correspond with the proper transport protocol.

Buy Now
Questions 80

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except the ports that must be used. He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about the programs like Hping2 that can get into a network through covert channels.

Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?

Options:

A.

Block ICMP type 13 messages

B.

Block ICMP type 3 messages

C.

Block all outgoing traffic on port 21

D.

Block all outgoing traffic on port 53

Buy Now
Questions 81

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WPA with 802.1X authentication

B.

WPA with Pre Shared Key

C.

WEP

D.

WPA

Buy Now
Questions 82

What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?

Options:

A.

Use the TRACERT command with the /pingname parameter.

B.

Ping the source host with its computer name.

C.

Ping the source host with its IP address.

D.

Check the IP statistics on the file server.

Buy Now
Questions 83

Which of the following statements about the traceroute utility are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection Systems.

B.

It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host.

C.

It records the time taken for a round trip for each packet at each router.

D.

It is an online tool that performs polymorphic shell code attacks.

Buy Now
Questions 84

The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Data Link layer

B.

Transport layer

C.

Network layer

D.

Physical layer

Buy Now
Questions 85

Which of the following proxy servers is also referred to as transparent proxies or forced proxies?

Options:

A.

Reverse proxy server

B.

Intercepting proxy server

C.

Anonymous proxy server

D.

Tunneling proxy server

Buy Now
Questions 86

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

Options:

A.

Hunt

B.

Ettercap

C.

Alchemy Remote Executor

D.

Mendax

Buy Now
Questions 87

Which of the following monitors program activities and modifies malicious activities on a system?

Options:

A.

Back door

B.

NIDS

C.

HIDS

D.

RADIUS

Buy Now
Questions 88

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. You have searched all open ports of the we-are-secure server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of the following tools can you use to accomplish the task?

Options:

A.

Nmap

B.

NBTscan

C.

P0f

D.

Superscan

Buy Now
Questions 89

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?

Options:

A.

LogIDS 1.0

B.

WIDS

C.

Snort 2.1.0

D.

NFR security

Buy Now
Questions 90

You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

Options:

A.

Local-link

B.

Global unicast

C.

Site-local

D.

Loopback

Buy Now
Questions 91

Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?

Options:

A.

iptables

B.

WinPcap

C.

Netfilter

D.

tcpdump

Buy Now
Questions 92

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

Options:

A.

PCAP

B.

WinPCap

C.

libpcap

D.

SysPCap

Buy Now
Questions 93

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

Which of the following tools can be used as a countermeasure to such an attack?

Options:

A.

Kismet

B.

Absinthe

C.

SmashGuard

D.

Obiwan

Buy Now
Questions 94

Which of the following statements are true about an IDP rule base notification?

Options:

A.

It can be defined as reusable logical entities that the user can apply to the rules.

B.

When an action is performed, a notification defines how to log information.

C.

It is used to specify the type of network traffic that has to be monitored for attacks.

D.

It directs an IDP to drop or close the connection.

Buy Now
Questions 95

Which of the following commands configures a router to encrypt all passwords entered after the command has been executed, as well as all passwords already on the running configuration?

Options:

A.

no service password-encryption

B.

enable password-encryption

C.

no enable password-encryption

D.

service password-encryption

Buy Now
Questions 96

You work as a Network Administrator for NetTech Inc. You want to prevent your network from Ping flood attacks. Which of the following protocols will you block to accomplish this task?

Options:

A.

IP

B.

PPP

C.

ICMP

D.

FTP

Buy Now
Questions 97

Which of the following Wireless LAN standard devices is least affected by interference from domestic appliances such as microwave ovens?

Options:

A.

802.11b

B.

802.11

C.

802.11a

D.

802.11g

Buy Now
Questions 98

Which of the following are the countermeasures against a man-in-the-middle attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using Secret keys for authentication.

B.

Using public key infrastructure authentication.

C.

Using Off-channel verification.

D.

Using basic authentication.

Buy Now
Questions 99

Which of the following types of firewall ensures that the packets are part of the established session?

Options:

A.

Application-level firewall

B.

Switch-level firewall

C.

Stateful inspection firewall

D.

Circuit-level firewall

Buy Now
Questions 100

Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack. What can he do to accomplish this?

Options:

A.

Use an SSL certificate.

B.

Use a proxy server.

C.

Use a firewall.

D.

Use EFS.

Buy Now
Questions 101

Which of the following can be monitored by using the host intrusion detection system (HIDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Computer performance

B.

File system integrity

C.

Storage space on computers

D.

System files

Buy Now
Questions 102

Which of the following firewalls filters the traffic based on the header of the datagram?

Options:

A.

Application-level firewall

B.

Packet filtering firewall

C.

Circuit-level firewall

D.

Stateful inspection firewall

Buy Now
Questions 103

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. You have recently come to know about the Slammer worm, which attacked computers in 2003 and doubled the number of infected hosts every 9 seconds or so. Slammer infected 75000 hosts in the first 10 minutes of the attack. To mitigate such security threats, you want to configure security tools on the network. Which of the following tools will you use?

Options:

A.

Intrusion Prevention Systems

B.

Firewall

C.

Anti-x

D.

Intrusion Detection Systems

Buy Now
Questions 104

On which of the following interfaces of the router is the clock rate command used?

Options:

A.

DCE

B.

ETHERNET

C.

VIRTUAL LINE VTY

D.

DTE

Buy Now
Questions 105

A remote-access VPN offers secured and encrypted connections between mobile or remote users and their corporate network across public networks. Which of the following does the remote-access VPN use for offering these types of connections?

Each correct answer represents a complete solution. Choose two.

Options:

A.

SSL

B.

IPsec

C.

TLS

D.

SSH

Buy Now
Questions 106

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

Options:

A.

Install a DMZ firewall

B.

Enable verbose logging on the firewall

C.

Install a host-based IDS

D.

Install a network-based IDS

Buy Now
Questions 107

Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.

Which of the following protocols does the DCC use?

Options:

A.

ICMP

B.

UDP

C.

TELNET

D.

TCP

Buy Now
Questions 108

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

Options:

A.

Cain

B.

Libnids

C.

Dsniff

D.

LIDS

Buy Now
Questions 109

Which of the following is the default port for POP3?

Options:

A.

25

B.

21

C.

80

D.

110

Buy Now
Questions 110

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Temporary Internet Folder

B.

History folder

C.

Download folder

D.

Cookies folder

Buy Now
Questions 111

You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks. Which of the following applications will you use to accomplish the task?

Options:

A.

Network enumerator

B.

Web application security scanner

C.

Computer worm

D.

Port scanner

Buy Now
Questions 112

Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.

Which of the following attacks has been occurred on the wireless network of Adam?

Options:

A.

DNS cache poisoning

B.

ARP spoofing

C.

MAC spoofing

D.

NAT spoofing

Buy Now
Questions 113

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

Options:

A.

Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system

B.

Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces

C.

Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces

D.

Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

Buy Now
Questions 114

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Kismet

B.

PsPasswd

C.

AirSnort

D.

Cain

Buy Now
Questions 115

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP

B.

FTP

C.

IPX/SPX

D.

IPSec

Buy Now
Questions 116

Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

Options:

A.

Fpipe

B.

tcptrace

C.

tcptraceroute

D.

Sniffer

Buy Now
Questions 117

Which of the following is a valid IPv6 address?

Options:

A.

45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE

B.

45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE

C.

123.111.243.123

D.

45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

Buy Now
Exam Code: GCFW
Exam Name: GIAC Certified Firewall Analyst
Last Update: Sep 15, 2025
Questions: 391
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now GCFW