Pass the GIAC GIAC Certification GCFW Questions and answers with CertsForce

Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions
Questions # 91:

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Mendax


B.

Fragroute


C.

Tcpdump


D.

Ettercap


Expert Solution
Questions # 92:

What are the advantages of stateless autoconfigration in IPv6?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

No server is needed for stateless autoconfiguration.


B.

No host configuration is necessary.


C.

It provides basic authentication to determine which systems can receive configuration data


D.

Ease of use.


Expert Solution
Questions # 93:

Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?

Options:

A.

WEP


B.

WPA


C.

L2TP


D.

IPSec


Expert Solution
Questions # 94:

Which of the following types of firewall functions at the Session layer of OSI model?

Options:

A.

Switch-level firewall


B.

Circuit-level firewall


C.

Packet filtering firewall


D.

Application-level firewall


Expert Solution
Questions # 95:

Which of the following devices is used to identify out-of-date software versions, applicable patches, system upgrades, etc?

Options:

A.

Retinal scanner


B.

Fingerprint reader


C.

Smart card reader


D.

Vulnerability scanner


Expert Solution
Questions # 96:

You work as a Security Manger for Tech Perfect Inc. The company has a Windows-based network.

You want to scroll real-time network traffic to a command console in a readable format. Which of the following command line utilities will you use to accomplish the task?

Options:

A.

WinPcap


B.

WinDump


C.

iptables


D.

libpcap


Expert Solution
Questions # 97:

Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Ping of Death attack


B.

SYN flood attack


C.

Teardrop attack


D.

Land attack


Expert Solution
Questions # 98:

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Multicast


B.

Anycast


C.

Broadcast


D.

Unicast


Expert Solution
Questions # 99:

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.

Network-based


B.

File-based


C.

Signature-based


D.

Anomaly-based


Expert Solution
Questions # 100:

Which of the following steps are generally followed in computer forensic examinations?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Encrypt


B.

Analyze


C.

Acquire


D.

Authenticate


Expert Solution
Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions