Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GCFW Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCFW Premium Access

View all detail and faqs for the GCFW exam


860 Students Passed

85% Average Score

97% Same Questions
Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

Options:

A.

Biometric device

B.

Man trap

C.

Host Intrusion Detection System (HIDS)

D.

Network Intrusion Detection System (NIDS)

Questions # 42:

The promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it. Which of the following tools works by placing the host system network card into the promiscuous mode?

Options:

A.

Snort

B.

THC-Scan

C.

NetStumbler

D.

Sniffer

Questions # 43:

Which of the following fields is 13 bits long and specifies the offset of a particular fragment relative to the beginning of the original un-fragmented IP datagram?

Options:

A.

Time to live

B.

Protocol

C.

Header checksum

D.

Fragment offset

Questions # 44:

Which of the following tools uses PDA and barcode technologies in order to enable effective identification, control, and reporting of items in a site?

Options:

A.

Smart card

B.

Vulnerability scanner

C.

Baseline audit

D.

Biometric device

Questions # 45:

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

DES

B.

IDEA

C.

RC4

D.

Blowfish

Questions # 46:

You run the tcpdump command line utility and get a report produced by tcpdump. What information does this report include?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Packets dropped by kernel

B.

Packets discarded

C.

Packets captured

D.

Packets received by filter

Questions # 47:

Which of the following steps are generally followed in computer forensic examinations?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Authenticate

B.

Acquire

C.

Encrypt

D.

Analyze

Questions # 48:

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small-sized packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack signatures of such attacks. Which of the following tools can be used to perform session splicing attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Whisker

B.

Fragroute

C.

Nessus

D.

Y.A.T.

Questions # 49:

Which of the following actions can be taken as the countermeasures against the ARP spoofing attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Placing static ARP entries on servers and routers

B.

Looking for large amount of ARP traffic on local subnets

C.

Using Private VLANs

D.

Using 8 digit passwords for authentication

Questions # 50:

An organization has a TCP/IP based network. It uses IPv6 addressing in its network. IPv6 tackles addressing and routing-table problems, and improves the protocol as well. Which of the following statements is true about IPv6?

Options:

A.

It uses symmetric key encryption.

B.

Its address is 32 bits in length.

C.

It eliminates the primary need for Network Address Translation (NAT).

D.

It implements broadcasting.

Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.