Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GCFW Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCFW Premium Access

View all detail and faqs for the GCFW exam


860 Students Passed

85% Average Score

97% Same Questions
Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

Options:

A.

Honeynet

B.

Research honeypot

C.

Honeyfarm

D.

Production honeypot

Questions # 52:

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

True positive

B.

False positive

C.

True negative

D.

False negative

Questions # 53:

Which of the following is the module of OpenSER?

Options:

A.

Sipsak

B.

TShark

C.

WireShark

D.

SipTrace

Questions # 54:

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes.

On the basis of above information, which of the following types of attack is Adam attempting to perform?

Options:

A.

Fraggle attack

B.

SYN Flood attack

C.

Ping of death attack

D.

Land attack

Questions # 55:

Which of the following is a version of netcat with integrated transport encryption capabilities?

Options:

A.

Nikto

B.

Encat

C.

Cryptcat

D.

Socat

Questions # 56:

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command. Which of the following commands will you use?

Options:

A.

ping -a

B.

ping -l

C.

ping -n

D.

ping –t

Questions # 57:

Which of the following ports cannot be used to access the router from a computer?

Options:

A.

Serial port

B.

Vty

C.

Aux port

D.

Console port

Questions # 58:

Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a remote location and a public IPv4 address, instead of public IPv6 address, has been assigned to the computer?

Options:

A.

Teredo

B.

PortProxy

C.

6to4

D.

ISATAP

Questions # 59:

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Packet filtering

B.

Firewall

C.

Demilitarized zone (DMZ)

D.

Intrusion detection system (IDS)

Questions # 60:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the preattack phase:

l Information gathering

l Determining network range

l Identifying active machines

l Finding open ports and applications

l OS fingerprinting

l Fingerprinting services

Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ettercap

B.

Traceroute

C.

NeoTrace

D.

Cheops

Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.