Pass the GIAC GIAC Certification GCFW Questions and answers with CertsForce

Viewing page 11 out of 12 pages
Viewing questions 101-110 out of questions
Questions # 101:

Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?

Options:

A.

IP identification number


B.

SSID


C.

MAK ID


D.

IP address


Expert Solution
Questions # 102:

Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

Options:

A.

Security audit


B.

Corrective controls


C.

Audit trail


D.

Detective controls


Expert Solution
Questions # 103:

John works as the Security Manager for PassGuide Inc. He wants to create the Profiler database that stores information about the network activity at Layer 3, Layer 4, and Layer 7. Which of the following will he use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ignore connection


B.

Session creation


C.

Protocol contexts


D.

Session teardown


Expert Solution
Questions # 104:

Which of the following are open-source vulnerability scanners?

Options:

A.

NetRecon


B.

Hackbot


C.

Nessus


D.

Nikto


Expert Solution
Questions # 105:

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP


B.

FTP


C.

IPX/SPX


D.

IPSec


Expert Solution
Questions # 106:

Which of the following is a maintenance protocol that permits routers and host computers to swap basic control information when data is sent from one computer to another?

Options:

A.

ICMP


B.

SNMP


C.

IGMP


D.

BGP


Expert Solution
Questions # 107:

WinDump, tcpdump, and Wireshark specify which fields of information libpcap should record.

Which of the following filters do they use in order to accomplish the task?

Options:

A.

Berkeley Packet Filter


B.

IM filter


C.

Web filter


D.

FIR filter


Expert Solution
Questions # 108:

In which of the following situations does legal and authorized traffic cause an intrusion detection system (IDS) to generate an alert and slow down performance?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

False alert


B.

False illusion


C.

False generation


D.

False positives


Expert Solution
Questions # 109:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the preattack phase:

l Information gathering

l Determining network range

l Identifying active machines

l Finding open ports and applications

l OS fingerprinting

l Fingerprinting services

Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ettercap


B.

Traceroute


C.

NeoTrace


D.

Cheops


Expert Solution
Questions # 110:

Which of the following protocols is used by TFTP as a file transfer protocol?

Options:

A.

TCP


B.

SNMP


C.

UDP


D.

SMTP


Expert Solution
Viewing page 11 out of 12 pages
Viewing questions 101-110 out of questions