Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GCFW Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCFW Premium Access

View all detail and faqs for the GCFW exam


860 Students Passed

85% Average Score

97% Same Questions
Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following devices works as a transparent bridge between the wireless clients and the wired network?

Options:

A.

Access point

B.

Hub

C.

Switch

D.

Wireless router

Questions # 32:

Which of the following are packet filtering tools for the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Zone Alarm

B.

BlackICE

C.

IPFilter

D.

IPTables

Questions # 33:

The simplest form of a firewall is a packet filtering firewall. A packet filtering firewall filters packets at the Network layer and Transport layer. What are the types of information that are filtered at the Network layer of the OSI reference model?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

TCP/IP protocols

B.

TCP control flags

C.

IP addresses

D.

TCP and UDP port numbers

Questions # 34:

Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers. Which of the following programs can Mark use to fulfill this requirement?

Options:

A.

Microsoft Internet Security & Acceleration Server (ISA)

B.

Sniffer

C.

Wingate

D.

SOCKS

Questions # 35:

Which of the following attacks sends false ICMP packets in an attempt to cripple a system using random fake Internet source addresses?

Options:

A.

Twinge attack

B.

Replay attack

C.

Land attack

D.

SYN attack

Questions # 36:

Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network. Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools can Andrew use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

FINALeMAIL

B.

EventCombMT

C.

eMailTrackerPro

D.

R-mail

Questions # 37:

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

Options:

A.

Firewall

B.

IPsec

C.

ACL

D.

NAT

Questions # 38:

You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer. While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command. What is the cause of the issue?

Options:

A.

Windows Firewall blocks the command line tools.

B.

Core Networking Firewall rules do not allow ICMPv4 or ICMPv6 Echo Requests.

C.

Core Networking Firewall rules do not allow IPv4 or IPv6.

D.

Windows Firewall rules do not allow Core Networking Tools.

Questions # 39:

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Prepare a chain of custody and handle the evidence carefully.

B.

Follow the rules of evidence and never temper with the evidence.

C.

Never exceed the knowledge base of the forensic investigation.

D.

Examine original evidence and never rely on the duplicate evidence.

Questions # 40:

Which of the following tools is used to detect spam email without checking the content?

Options:

A.

Sniffer

B.

DCC

C.

EtherApe

D.

Kismet

Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.