Pass the GIAC GIAC Certification GCFW Questions and answers with CertsForce

Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following vulnerability scanners detects vulnerabilities by actually performing attacks?

Options:

A.

Network enumerator


B.

Computer worm


C.

Port scanner


D.

Web application security scanner


Expert Solution
Questions # 52:

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be most helpful against Denial of Service (DOS) attacks?

Options:

A.

Stateful Packet Inspection (SPI) firewall


B.

Packet filtering firewall


C.

Network surveys.


D.

Honey pot


Expert Solution
Questions # 53:

You run the tcpdump command line utility and get a report produced by tcpdump. What information does this report include?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Packets dropped by kernel


B.

Packets discarded


C.

Packets captured


D.

Packets received by filter


Expert Solution
Questions # 54:

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

Options:

A.

Active IDS


B.

Network-based IDS


C.

Signature-based IDS


D.

Passive IDS


Expert Solution
Questions # 55:

Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

Options:

A.

Honeynet


B.

Research honeypot


C.

Honeyfarm


D.

Production honeypot


Expert Solution
Questions # 56:

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Prepare a chain of custody and handle the evidence carefully.


B.

Follow the rules of evidence and never temper with the evidence.


C.

Never exceed the knowledge base of the forensic investigation.


D.

Examine original evidence and never rely on the duplicate evidence.


Expert Solution
Questions # 57:

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Application-level firewall


B.

Stateful inspection firewall


C.

Circuit-level firewall


D.

Packet filtering firewall


Expert Solution
Questions # 58:

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

nmap


B.

libnids


C.

portsentry


D.

scanlogd


Expert Solution
Questions # 59:

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate computer of an unfaithful employee of SecureEnet Inc. Suspect's computer runs on Windows operating system. Which of the following sources will Adam investigate on a Windows host to collect the electronic evidences?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Allocated cluster


B.

Swap files


C.

Unused and hidden partition


D.

Slack spaces


Expert Solution
Questions # 60:

Which of the following types of Intrusion Detection Systems consists of an agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state?

Options:

A.

HIDS


B.

NIDS


C.

APIDS


D.

PIDS


Expert Solution
Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions