Pass the GIAC GIAC Certification GCFW Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

Options:

A.

Fpipe


B.

tcptrace


C.

tcptraceroute


D.

Sniffer


Expert Solution
Questions # 72:

Which of the following terms is used to represent IPv6 addresses?

Options:

A.

Colon-dot


B.

Hexadecimal-dot notation


C.

Colon-hexadecimal


D.

Dot notation


Expert Solution
Questions # 73:

Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?

Options:

A.

Overloading


B.

Dynamic NAT


C.

Overclocking


D.

Static NAT


Expert Solution
Questions # 74:

Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?

Options:

A.

Snort


B.

Cain


C.

NetStumbler


D.

AiroPeek


Expert Solution
Questions # 75:

Which of the following well-known ports is used by BOOTP?

Options:

A.

UDP 69


B.

TCP 161


C.

TCP 21


D.

UDP 67


Expert Solution
Questions # 76:

Which of the following are the countermeasures against a man-in-the-middle attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using Secret keys for authentication.


B.

Using public key infrastructure authentication.


C.

Using Off-channel verification.


D.

Using basic authentication.


Expert Solution
Questions # 77:

A remote-access VPN offers secured and encrypted connections between mobile or remote users and their corporate network across public networks. Which of the following does the remote-access VPN use for offering these types of connections?

Each correct answer represents a complete solution. Choose two.

Options:

A.

SSL


B.

IPsec


C.

TLS


D.

SSH


Expert Solution
Questions # 78:

Which of the following statements are true about an IPv6 network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It uses longer subnet masks than those used in IPv4.


B.

It increases the number of available IP addresses.


C.

For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.


D.

It provides improved authentication and security.


E.

It uses 128-bit addresses.


Expert Solution
Questions # 79:

An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network. Which of the following processes does an IDS perform?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Event log analysis


B.

Monitoring and analysis of user and system activity


C.

Statistical analysis of abnormal traffic patterns


D.

Network traffic analysis


Expert Solution
Questions # 80:

A scenario involves a pool of users with private IP addresses who need to access the Internet; however, the company has a limited number of IP addresses and needs to ensure users occupy only one public IP address.

Which technology is used to allow a pool of users to share one global IP address for Internet access?

Options:

A.

Port Address Translation


B.

Per-user Address Translation


C.

Pool Address Translation


D.

Private Address Translation


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 71-80 out of questions