Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GCFW Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCFW Premium Access

View all detail and faqs for the GCFW exam


860 Students Passed

85% Average Score

97% Same Questions
Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions
Questions # 81:

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

Which of the following tools can be used as a countermeasure to such an attack?

Question # 81

Options:

A.

Kismet

B.

Absinthe

C.

SmashGuard

D.

Obiwan

Questions # 82:

Which of the following tools can be used as a Linux vulnerability scanner that is capable of identifying operating systems and network services?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cheops-ng

B.

Fport

C.

Cheops

D.

Elsave

Questions # 83:

Which of the following types of audit constructs a risk profile for existing and new projects?

Options:

A.

Innovative comparison audit

B.

Client/Server, Telecommunications, Intranets, and Extranets audits

C.

Technological position audit

D.

Technological innovation process audit

Questions # 84:

A remote-access VPN offers secured and encrypted connections between mobile or remote users and their corporate network across public networks. Which of the following does the remote-access VPN use for offering these types of connections?

Each correct answer represents a complete solution. Choose two.

Options:

A.

SSL

B.

IPsec

C.

TLS

D.

SSH

Questions # 85:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the preattack phase successfully:

l Information gathering

l Determination of network range

l Identification of active systems

l Location of open ports and applications

Now, which of the following tasks should he perform next?

Options:

A.

Install a backdoor to log in remotely on the We-are-secure server.

B.

Map the network of We-are-secure Inc.

C.

Perform OS fingerprinting on the We-are-secure network.

D.

Fingerprint the services running on the we-are-secure network.

Questions # 86:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the pre-attack phase to check the security of the We-are-secure network:

l Gathering information

l Determining the network range

l Identifying active systems

Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

Options:

A.

APNIC

B.

ARIN

C.

SuperScan

D.

RIPE

Questions # 87:

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?

Options:

A.

LogIDS 1.0

B.

WIDS

C.

Snort 2.1.0

D.

NFR security

Questions # 88:

Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

Options:

A.

Application protocol-based intrusion detection system (APIDS)

B.

Network intrusion detection system (NIDS)

C.

Protocol-based intrusion detection system (PIDS)

D.

Host-based intrusion detection system (HIDS)

Questions # 89:

Which of the following IPv4 to IPv6 transition methods uses encapsulation of IPv6 packets to traverse IPv4 networks?

Options:

A.

Stack

B.

Translation

C.

Tunneling

D.

Dual-stack

Questions # 90:

Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address?

Options:

A.

Proxy server

B.

Application gateway

C.

Packet Filtering

D.

Circuit-level gateway

Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.