Pass the GIAC GIAC Certification GCFW Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following is a hardware/software platform that is designed to analyze, detect and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

Options:

A.

NIPS


B.

HIPS


C.

NIDS


D.

HIDS


Expert Solution
Questions # 22:

Which of the following can be used in an extended access list to filter traffic?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Source IP address


B.

Destination IP address


C.

Destination MAC address


D.

Protocol


E.

TCP or UDP port number


Expert Solution
Questions # 23:

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone. Which of the following commands will you use to accomplish the task?

Options:

A.

Dnscmd /config /enableglobalnamessupport 1


B.

Dnscmd /config /globalnamesqueryorder 0


C.

Dnscmd /config /enableglobalnames 1


D.

Dnscmd /config /enableglobalnamessupport 0


Expert Solution
Questions # 24:

John works as a Security Manager for Gentech Inc. The company has a Windows-based network.

John has been assigned a project to detect the services used by an attack to access the network.

For this purpose, he is required to use the predefined service objects of the rulebase. This predefined service object defines the services used in the attack to access the network. Which of the following objects will he create when he finds that the attack is not defined in the predefined service objects?

Options:

A.

Custom service objects


B.

Signature attack objects


C.

Protocol anomaly attack objects


D.

Compound attack objects


Expert Solution
Questions # 25:

Which of the following methods will allow data to be sent on the Internet in a secure format?

Options:

A.

Browsing


B.

Virtual Private Networks


C.

Serial Line Interface Protocol


D.

Point-to-Point Protocol


Expert Solution
Questions # 26:

Fill in the blank with appropriate address translation type.

A______ performs translation of one IP address to a different one automatically. It requires manually defining two sets of addresses on the address translation device (probably a router). One set defines which inside addresses are allowed to be translated, and the other defines what these addresses are to be translated to.


Expert Solution
Questions # 27:

What are the advantages of stateless autoconfiguration in IPv6?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Ease of use.


B.

No server is needed for stateless autoconfiguration.


C.

It provides basic authentication to determine which systems can receive configuration data


D.

No host configuration is necessary.


Expert Solution
Questions # 28:

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

Options:

A.

Biometric device


B.

Man trap


C.

Host Intrusion Detection System (HIDS)


D.

Network Intrusion Detection System (NIDS)


Expert Solution
Questions # 29:

Which of the following types of firewall functions at the Session layer of OSI model?

Options:

A.

Circuit-level firewall


B.

Switch-level firewall


C.

Packet filtering firewall


D.

Application-level firewall


Expert Solution
Questions # 30:

Which of the following parts of IP header is used to specify the correct place of the fragment in the original un-fragmented datagram?

Options:

A.

Fragment ID


B.

Fragment offset


C.

TTL


D.

Source address


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions