Pass the GIAC GIAC Certification GCFW Questions and answers with CertsForce

Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions
Questions # 111:

Which of the following monitors program activities and modifies malicious activities on a system?

Options:

A.

Back door


B.

NIDS


C.

HIDS


D.

RADIUS


Expert Solution
Questions # 112:

You are the Network Administrator for a college. Wireless access is widely used at the college. You want the most secure wireless connections you can have. Which of the following would you use?

Options:

A.

WEP2


B.

WPA


C.

WPA2


D.

WEP


Expert Solution
Questions # 113:

Sam works as a Network Administrator for Gentech Inc. He has been assigned a project to develop the rules that define the IDP policy in the rulebase. Which of the following will he define as the components of the IDP policy rule?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

IDP Profiler


B.

IDP rule IP actions


C.

IDP appliance deployment mode


D.

IDP rule notifications


Expert Solution
Questions # 114:

Which of the following techniques is used to identify attacks originating from a botnet?

Options:

A.

BPF-based filter


B.

Recipient filtering


C.

IFilter


D.

Passive OS fingerprinting


Expert Solution
Questions # 115:

You work as a Network Administrator for BlueTech Inc. You want to configure Snort as an IDS for your company's wireless network, but you are concerned that Snort does not support all types of traffic. What traffic does Snort support?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

UDP


B.

TCP


C.

IP


D.

ICMP


Expert Solution
Questions # 116:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

Options:

A.

Hunt


B.

Ettercap


C.

Alchemy Remote Executor


D.

Mendax


Expert Solution
Questions # 117:

You work as a Security Administrator for Tech Perfect Inc. You have implemented and configured a web application security scanner in the company's network. It helps in the automated review of

the web applications with the defined purpose of discovering security vulnerabilities. In order to perform this task, the web application security scanner examines a number of vulnerabilities. What are these vulnerabilities?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Server configuration mistakes/errors/version


B.

Specific application problems


C.

Input/Output validation


D.

Denials of service against the TCP/IP stack


Expert Solution
Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions