Pass the GIAC GIAC Certification GCFW Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions
Questions # 31:

You work as a Network Administrator for NetTech Inc. Your manager needs to access a particular server on the network from outside the company network. You have a registered IP address assigned to a router on the company network. Which of the following will be useful for accessing the server from outside the network?

Options:

A.

Dynamic VLAN


B.

Overloading


C.

Switch


D.

Static NAT


Expert Solution
Questions # 32:

Which of the following fields is 13 bits long and specifies the offset of a particular fragment relative to the beginning of the original un-fragmented IP datagram?

Options:

A.

Time to live


B.

Protocol


C.

Header checksum


D.

Fragment offset


Expert Solution
Questions # 33:

Which of the following is the module of OpenSER?

Options:

A.

Sipsak


B.

TShark


C.

WireShark


D.

SipTrace


Expert Solution
Questions # 34:

Choose the best explanation for the resulting error when entering the command below.

Options:

A.

The command is attempting to create a standard access list with extended access list param eters.


B.

The ACL commands should be entered from the (config-router) configuration mode.


C.

The wildcard mask is not provided for the source and destination addresses.


D.

The port number given does not correspond with the proper transport protocol.


Expert Solution
Questions # 35:

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

True negative


B.

False negative


C.

False positive


D.

True positive


Expert Solution
Questions # 36:

Which of the following IPv4 fields become obsolete while removing the hop-by-hop segmentation (fragmentation) procedure from the IP header?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Datagram Identification Number field


B.

Fragment Offset field


C.

Datagram Length field


D.

Flags field


Expert Solution
Questions # 37:

You work as a Network Administrator for NetTech Inc. Your manager needs to access a particular server on the network from outside the company network. You have a registered IP address assigned to a router on the company network. Which of the following will be useful for accessing the server from outside the network?

Options:

A.

Overloading


B.

Dynamic VLAN


C.

Switch


D.

Static NAT


Expert Solution
Questions # 38:

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

Options:

A.

IPsec


B.

Firewall


C.

ACL


D.

NAT


Expert Solution
Questions # 39:

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Tcpdump


B.

Ettercap


C.

Fragroute


D.

Mendax


Expert Solution
Questions # 40:

The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Network layer


B.

Transport layer


C.

Data Link layer


D.

Physical layer


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions