Pass the GIAC GIAC Certification GCFW Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions
Questions # 61:

You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

Options:

A.

Local-link


B.

Global unicast


C.

Site-local


D.

Loopback


Expert Solution
Questions # 62:

Which of the following tools can be used as a Linux vulnerability scanner that is capable of identifying operating systems and network services?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cheops-ng


B.

Fport


C.

Cheops


D.

Elsave


Expert Solution
Questions # 63:

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Names of the victims


B.

Location of each incident


C.

Date and time of incident


D.

Nature of harassment


Expert Solution
Questions # 64:

Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address?

Options:

A.

Proxy server


B.

Application gateway


C.

Packet Filtering


D.

Circuit-level gateway


Expert Solution
Questions # 65:

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Firewall


B.

Console


C.

Gateway


D.

Modem


E.

Sensor


Expert Solution
Questions # 66:

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Physical layer


B.

The Presentation layer


C.

The Network layer


D.

The Data-Link layer


Expert Solution
Questions # 67:

You work as a Network Administrator for NetTech Inc. You want to prevent your network from Ping flood attacks. Which of the following protocols will you block to accomplish this task?

Options:

A.

IP


B.

PPP


C.

ICMP


D.

FTP


Expert Solution
Questions # 68:

Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.

Which of the following protocols does the DCC use?

Options:

A.

ICMP


B.

UDP


C.

TELNET


D.

TCP


Expert Solution
Questions # 69:

Which of the following can be applied as countermeasures against DDoS attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using the network-ingress filtering


B.

Limiting the amount of network bandwidth


C.

Blocking IP address


D.

Using Intrusion detection systems


E.

Using LM hashes for passwords


Expert Solution
Questions # 70:

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

Options:

A.

Electronic Codebook (ECB) Mode


B.

Cipher Block Chaining (CBC) Mode


C.

Propagating Cipher Block Chaining (PCBC) Mode


D.

Cipher Feedback (CFB) Mode


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions