Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GCFW Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCFW Premium Access

View all detail and faqs for the GCFW exam


860 Students Passed

85% Average Score

97% Same Questions
Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions
Questions # 91:

On which of the following interfaces of the router is the clock rate command used?

Options:

A.

DCE

B.

ETHERNET

C.

VIRTUAL LINE VTY

D.

DTE

Questions # 92:

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. You have searched all open ports of the we-are-secure server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of the following tools can you use to accomplish the task?

Options:

A.

Nmap

B.

NBTscan

C.

P0f

D.

Superscan

Questions # 93:

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Firewall

B.

Console

C.

Gateway

D.

Modem

E.

Sensor

Questions # 94:

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

Options:

A.

Session splicing attack

B.

Evasion attack

C.

Polymorphic shell code attack

D.

Insertion attack

Questions # 95:

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

Options:

A.

Nikto

B.

Sniffer

C.

Snort

D.

Dsniff

Questions # 96:

Which of the following actions can be taken as the countermeasures against the ARP spoofing attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using Private VLANs

B.

Looking for large amount of ARP traffic on local subnets

C.

Placing static ARP entries on servers and routers

D.

Using 8 digit passwords for authentication

Questions # 97:

In which of the following situations does legal and authorized traffic cause an intrusion detection system (IDS) to generate an alert and slow down performance?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

False alert

B.

False illusion

C.

False generation

D.

False positives

Questions # 98:

Which of the following number ranges is used for the IP Standard ACL?

Options:

A.

100-199

B.

1000-1099

C.

600-699

D.

1-99

Questions # 99:

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

Options:

A.

Cain

B.

Libnids

C.

Dsniff

D.

LIDS

Questions # 100:

Which of the following techniques is used to identify attacks originating from a botnet?

Options:

A.

BPF-based filter

B.

Recipient filtering

C.

IFilter

D.

Passive OS fingerprinting

Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.