Pass the GIAC GIAC Certification GCFW Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following is a version of netcat with integrated transport encryption capabilities?

Options:

A.

Nikto


B.

Encat


C.

Cryptcat


D.

Socat


Expert Solution
Questions # 2:

Which of the following attacks generates falsified information within an IP header?

Options:

A.

DNS spoofing attack


B.

IP spoofing attack


C.

Web spoofing attack


D.

ARP spoofing attack


Expert Solution
Questions # 3:

Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Under which of the following controls does audit control come?

Options:

A.

Protective controls


B.

Preventive controls


C.

Detective controls


D.

Reactive controls


Expert Solution
Questions # 4:

You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices. What will you do?

Options:

A.

Implement a dynamic NAT.


B.

Implement a firewall.


C.

Implement an ACL.


D.

Implement a WIPS.


Expert Solution
Questions # 5:

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

443


B.

80


C.

22


D.

21


Expert Solution
Questions # 6:

You work as a Security Administrator for Tech Perfect Inc. The company has a switched network. You have configured tcpdump in the network which can only see traffic addressed to itself and broadcast traffic. What will you do when you are required to see all traffic of the network?

Options:

A.

Connect the sniffer device to a Remote Switched Port Analyzer (RSPAN) port.


B.

Configure VLAN Access Control List (VACL).


C.

Configure Network Access Control (NAC).


D.

Connect the sniffer device to a Switched Port Analyzer (SPAN) port.


Expert Solution
Questions # 7:

In which of the following locations can the Cisco IOS file reside?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

TFTP server


B.

ROM


C.

Flash memory


D.

NVRAM


Expert Solution
Questions # 8:

Which of the following is a console-based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system?

Options:

A.

Hping2


B.

Nemesis


C.

Scapy


D.

Kismet


Expert Solution
Questions # 9:

Which of the following applications cannot proactively detect anomalies related to a computer?

Options:

A.

NIDS


B.

Anti-virus scanner


C.

Firewall installed on the computer


D.

HIDS


Expert Solution
Questions # 10:

Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?

Options:

A.

WinPcap


B.

Netfilter


C.

tcpdump


D.

iptables


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions