Pass the GIAC GIAC Certification GCFW Questions and answers with CertsForce

Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions
Questions # 41:

You work as a Network Architect for Tech Perfect Inc. The company has a TCP/IP based network. You have established a remote-access VPN network between mobile users and the company's network. You want to implement the following features in the remote-access VPN network:

l Provide security for the web traffic.

l Browser clients can support the VPN connection to a host.

Which of the following will you configure to implement the given features in the network?

Options:

A.

IPsec


B.

SSL


C.

DACL


D.

SSH


Expert Solution
Questions # 42:

Which of the following techniques correlates information found on multiple hard drives?

Options:

A.

Cross-drive analysis


B.

Data analysis


C.

Live analysis


D.

Gap analysis


Expert Solution
Questions # 43:

John works as a Network Administrator for Web Perfect Inc. The company has a wireless LAN network. John has configured shared key authentication on a client. The client and the AP start exchanging the frames to enable authentication. Which of the following vulnerabilities may occur while the client and the AP exchange the challenge text over the wireless link?

Options:

A.

DoS attack


B.

Land attack


C.

Vulnerability attack


D.

Man-in-the-middle attack


Expert Solution
Questions # 44:

Which of the following tools is used to detect spam email without checking the content?

Options:

A.

Sniffer


B.

DCC


C.

EtherApe


D.

Kismet


Expert Solution
Questions # 45:

The stateful firewalls combine the significant flows into conversations. Which of the following properties is used to classify a flow?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Destination address


B.

Source port


C.

Protocol


D.

Destination port


E.

Source address


Expert Solution
Questions # 46:

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter?

Options:

A.

PIX firewall


B.

Virtual firewall


C.

Stateful packet filter firewall


D.

Stateless packet filter firewall


Expert Solution
Questions # 47:

Which of the following tools detects certain types of packet filters and NAT setups?

Options:

A.

TShark


B.

Vulnerability scanner


C.

Wireshark


D.

Passive OS fingerprinting


Expert Solution
Questions # 48:

Fill in the blank with the appropriate tool name.

______________ is a network protocol analyzer tool that is used to capture packet data from an existing network or examine packet data from a pre-saved file.


Expert Solution
Questions # 49:

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

DES


B.

IDEA


C.

RC4


D.

Blowfish


Expert Solution
Questions # 50:

John works as the Security Manager in PassGuide Inc. He wants to protect his network from a variant of the Denial-of-Service (DoS) attack. When the rulebase is enabled for protection, the IDP engine checks the traffic that exceeds the traffic thresholds. Which of the following rulebases is used for this purpose?

Options:

A.

Exempt rulebase


B.

SYN Protector rulebase


C.

Traffic Anomalies rulebase


D.

Backdoor rulebase


Expert Solution
Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions