[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 111-120

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFW.html

GIAC Certified Firewall Analyst

Question No: 111 – (Topic 1)

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

  1. ARP spoofing

  2. Replay attack

  3. Rainbow attack

  4. DoS attack

Answer: D

Question No: 112 – (Topic 1)

You send and receive messages on Internet. A man-in-the-middle attack can be performed to capture and read your message. Which of the following Information assurance pillars ensures the security of your message or data against this type of attack?

  1. Confidentiality

  2. Non-repudiation

  3. Data availability

  4. Authentication

Answer: C

Question No: 113 – (Topic 1)

Which of the following types of IP actions are supported by an IDP rulebase?

  1. Initiate rules of the rulebase

  2. Drop/block session

  3. Close connection

  4. Notify

Answer: B,C,D

Question No: 114 – (Topic 1)

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

  1. ACL

  2. IPsec

  3. Firewall

  4. NAT

Answer: D

Question No: 115 – (Topic 1)

Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

  1. Security audit

  2. Corrective controls

  3. Audit trail

  4. Detective controls

Answer: C

Question No: 116 – (Topic 1)

Which of the following terms is used to represent IPv6 addresses?

  1. Colon-dot

  2. Hexadecimal-dot notation

  3. Colon-hexadecimal

  4. Dot notation

Answer: C

Question No: 117 – (Topic 1)

Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?

  1. Packet collision

  2. Network enumerating

  3. Packet crafting

  4. Distributed Checksum Clearinghouse

Answer: C

Question No: 118 – (Topic 1)

What are the advantages of stateless autoconfigration in IPv6? Each correct answer represents a part of the solution. Choose three.

  1. No server is needed for stateless autoconfiguration.

  2. No host configuration is necessary.

  3. It provides basic authentication to determine which systems can receive configuration data

  4. Ease of use.

Answer: A,B,D

Question No: 119 – (Topic 1)

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we- are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

A. nc -v -n 208.100.2.25 80

B. nmap -v -O 208.100.2.25

C. nmap -v -O www.we-are-secure.com

D. nc 208.100.2.25 23

Answer: B,C

Question No: 120 – (Topic 1)

Adam works as a Security administrator for Umbrella Inc. He runs the following traceroute and notices that hops 19 and 20 both show the same IP address.

1 172.16.1.254 (172.16.1.254) 0.724 ms 3.285 ms 0.613 ms 2 ip68-98-176-

1.nv.nv.cox.net (68.98.176.1) 12.169 ms 14.958 ms 13.416 ms 3 ip68-98-176-

1.nv.nv.cox.net (68.98.176.1) 13.948 ms ip68-100-0-1.nv.nv. cox.net (68.100.0.1)

16.743 ms 16.207 ms 4 ip68-100-0-137.nv.nv.cox.net (68.100.0.137) 17.324 ms 13.933

ms 20.938 ms 5 68.1.1.4 (68.1.1.4) 12.439 ms 220.166 ms 204.170 ms

6 so-6-0-0.gar2.wdc1.Level3.net (67.29.170.1) 16.177 ms 25.943 ms 14.104 ms 7

unknown.Level3.net (209.247.9.173) 14.227 ms 17.553 ms 15.415 ms quot;PassGuidequot; –

8 so-0-1-0.bbr1.NewYork1.level3.net (64.159.1.41) 17.063 ms 20.960 ms 19.512 ms 9

so-7-0-0.gar1. NewYork1.Level3.net (64.159.1.182) 20.334 ms 19.440 ms 17.938 ms

10 so-4-0-0.edge1.NewYork1.Level3.

net (209.244.17.74) 27.526 ms 18.317 ms 21.202 ms 11 uunet-level3- oc48.NewYork1.Level3.net

(209.244.160.12) 21.411 ms 19.133 ms 18.830 ms 12 0.so-6-0-0.XL1.NYC4.ALTER.NET

(152.63.21.78)

21.203 ms 22.670 ms 20.111 ms 13 0.so-2-0-0.TL1.NYC8.ALTER.NET (152.63.0.153)

30.929 ms 24.858 ms

23.108 ms 14 0.so-4-1-0.TL1.ATL5.ALTER.NET (152.63.10.129) 37.894 ms 33.244 ms

33.910 ms 15 0.so-7-0-0.XL1.MIA4.ALTER.NET (152.63.86.189) 51.165 ms 49.935 ms

49.466 ms 16 0.so-3-0-0.XR1.MIA4.ALTER.

NET (152.63.101.41) 50.937 ms 49.005 ms 51.055 ms 17 117.ATM6-

0.GW5.MIA1.ALTER.NET (152.63.82.73) 51.897 ms 50.280 ms 53.647 ms 18

PassGuidegw1.

customer.alter.net (65.195.239.14) 51.921 ms 51.571 ms 56.855 ms 19

www.PassGuide.com (65.195.239.22) 52.191 ms 52.571 ms 56.855 ms 20

www.PassGuide.com (65.195.239.22) 53.561 ms 54.121 ms 58.333 ms Which of the following is the most like cause of this issue?

  1. A stateful inspection firewall

  2. An application firewall

  3. Network Intrusion system

  4. Intrusion Detection System

Answer: A

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.