Pass the GIAC GIAC Certification GCFW Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?

Options:

A.

iptables


B.

WinPcap


C.

Netfilter


D.

tcpdump


Expert Solution
Questions # 82:

You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?

Options:

A.

ping -l


B.

ping -t


C.

ping -a


D.

ping -4


Expert Solution
Questions # 83:

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police.

A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:

A.

Mac OS


B.

Linux


C.

Windows XP


D.

MINIX 3


Expert Solution
Questions # 84:

Which of the following Wireless LAN standard devices is least affected by interference from domestic appliances such as microwave ovens?

Options:

A.

802.11b


B.

802.11


C.

802.11a


D.

802.11g


Expert Solution
Questions # 85:

Which of the following commands configures a router to encrypt all passwords entered after the command has been executed, as well as all passwords already on the running configuration?

Options:

A.

no service password-encryption


B.

enable password-encryption


C.

no enable password-encryption


D.

service password-encryption


Expert Solution
Questions # 86:

Which of the following firewalls filters the traffic based on the header of the datagram?

Options:

A.

Application-level firewall


B.

Packet filtering firewall


C.

Circuit-level firewall


D.

Stateful inspection firewall


Expert Solution
Questions # 87:

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.

A firewall has been configured on the network. You configure a filter on the router. You verify that SMTP operations have stopped after the recent configuration. Which of the following ports will you have to open on the router to resolve the issue?

Options:

A.

25


B.

80


C.

20


D.

21


Expert Solution
Questions # 88:

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint. Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?

Options:

A.

nmap -O -p


B.

nmap -sT


C.

nmap -sU -p


D.

nmap -sS


Expert Solution
Questions # 89:

You work as a Network Architect for Tech Perfect Inc. The company has a corporate LAN network. You will have to perform the following tasks:

l Limit events that occur from security threats such as viruses, worms, and spyware.

l Restrict access to the network based on identity or security posture.

Which of the following services will you deploy in the network to accomplish the tasks?

Options:

A.

NetFlow


B.

Protocol-Independent Multicast


C.

Network Admission Control


D.

Firewall Service Module


Expert Solution
Questions # 90:

You have to ensure that your Cisco Router is only accessible via telnet and ssh from the following hosts and subnets:

10.10.2.103

10.10.0.0/24

Which of the following sets of commands will you use to accomplish the task?

Options:

A.

access-list 10 permit host 10.10.2.103

access-list 10 permit 10.10.0.0 0.0.0.255

access-list 10 deny any

line vty 0 4

access-class 10 in


B.

access-list 10 permit 10.10.2.103

access-list 10 permit 10.10.0.0 0.0.0.255

access-list 10 deny any

line vty 0 4

access-group 10 in


C.

access-list 10 permit host 10.10.2.103

access-list 10 permit 10.10.0.0 0.0.0.255

access-list 10 deny any

line vty 0 4

access-class 10 out


D.

access-list 10 permit host 10.10.2.103

access-list 11 permit host 10.10.0.0 255.255.255.0

access-list 12 deny any

line vty 0 4

access-group 10, 11, 12 in


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions