Pass the GIAC GIAC Certification GCFW Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following libraries does TShark use to capture traffic from the first available network interface?

Options:

A.

dcap


B.

scap


C.

bcap


D.

pcap


Expert Solution
Questions # 12:

Which of the following tools uses PDA and barcode technologies in order to enable effective identification, control, and reporting of items in a site?

Options:

A.

Smart card


B.

Vulnerability scanner


C.

Baseline audit


D.

Biometric device


Expert Solution
Questions # 13:

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

Options:

A.

Fragmentation overwrite attack


B.

Evasion attack


C.

Insertion attack


D.

Fragmentation overlap attack


Expert Solution
Questions # 14:

You work as a Network Administrator for NetTech Inc. You want to prevent your network from Ping flood attacks. Which of the following protocols will you block to accomplish this task?

Options:

A.

ICMP


B.

PPP


C.

IP


D.

FTP


Expert Solution
Questions # 15:

You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?

Options:

A.

ping -l


B.

ping -t


C.

ping -a


D.

ping -4


Expert Solution
Questions # 16:

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Multicast


B.

Anycast


C.

Broadcast


D.

Unicast


Expert Solution
Questions # 17:

You work as a Network Administrator for BlueTech Inc. You want to configure Snort as an IDS for your company's wireless network, but you are concerned that Snort does not support all types of traffic. What traffic does Snort support?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

TCP


B.

IP


C.

UDP


D.

ICMP


Expert Solution
Questions # 18:

Which of the following terms is used to represent IPv6 addresses?

Options:

A.

Hexadecimal-dot notation


B.

Colon-hexadecimal


C.

Colon-dot


D.

Dot notation


Expert Solution
Questions # 19:

Which of the following fields is NOT included in packet fragmentation?

Options:

A.

Flag


B.

Fragment Offset


C.

Identification


D.

Time to Live


Expert Solution
Questions # 20:

Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-topeer attacks when the laptops are used in public access network?

Options:

A.

Use protocol analyzer


B.

Use Port Address Translation


C.

Use security protocols


D.

Use firewall


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions