[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 101-110

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFW.html

GIAC Certified Firewall Analyst

Question No: 101 – (Topic 1)

The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information?

Each correct answer represents a complete solution. Choose all that apply.

  1. Data Link layer

  2. Transport layer

  3. Network layer

  4. Physical layer

Answer: B,C

Question No: 102 – (Topic 1)

Which of the following are open-source vulnerability scanners?

  1. NetRecon

  2. Hackbot

  3. Nessus

  4. Nikto

Answer: B,C,D

Question No: 103 – (Topic 1)

You have to ensure that your Cisco Router is only accessible via telnet and ssh from the following hosts and subnets:

10.10.2.103

10.10.0.0/24

Which of the following sets of commands will you use to accomplish the task?

  1. access-list 10 permit host 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255 access-list 10 deny any

    line vty 0 4

    access-class 10 in

  2. access-list 10 permit 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255 access-list 10 deny any

    line vty 0 4

    access-group 10 in

  3. access-list 10 permit host 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255 access-list 10 deny any

    line vty 0 4

    access-class 10 out

  4. access-list 10 permit host 10.10.2.103

access-list 11 permit host 10.10.0.0 255.255.255.0 access-list 12 deny any

line vty 0 4

access-group 10, 11, 12 in

Answer: A

Question No: 104 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the preattack phase:

l Information gathering

l Determining network range l Identifying active machines

l Finding open ports and applications l OS fingerprinting

l Fingerprinting services

Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Ettercap

  2. Traceroute

  3. NeoTrace

  4. Cheops

Answer: B,C,D

Question No: 105 – (Topic 1)

Which of the following is a valid IPv6 address?

A. 45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE B. 45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE C. 123.111.243.123

D. 45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

Answer: D

Question No: 106 – (Topic 1)

Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

  1. Fpipe

  2. tcptrace

  3. tcptraceroute

  4. Sniffer

Answer: B

Question No: 107 – (Topic 1)

Which of the following wireless security features provides the best wireless security mechanism?

  1. WPA with 802.1X authentication

  2. WPA with Pre Shared Key

  3. WEP

  4. WPA

Answer: A

Question No: 108 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

Which of the following tools is John using to crack the wireless encryption keys?

  1. Kismet

  2. PsPasswd

  3. AirSnort

  4. Cain

Answer: C

Question No: 109 – (Topic 1)

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?

Each correct answer represents a complete solution. Choose all that apply.

  1. Names of the victims

  2. Location of each incident

  3. Date and time of incident

  4. Nature of harassment

Answer: A,B,C

Question No: 110 – (Topic 1)

Which of the following parts of IP header is used to specify the correct place of the fragment in the original un-fragmented datagram?

  1. Fragment offset

  2. Source address

  3. TTL

  4. Fragment ID

Answer: A

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.