GIAC Certified Firewall Analyst
Question No: 111 – (Topic 1)
John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?
Question No: 112 – (Topic 1)
You send and receive messages on Internet. A man-in-the-middle attack can be performed to capture and read your message. Which of the following Information assurance pillars ensures the security of your message or data against this type of attack?
Question No: 113 – (Topic 1)
Which of the following types of IP actions are supported by an IDP rulebase?
Initiate rules of the rulebase
Question No: 114 – (Topic 1)
An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?
Question No: 115 – (Topic 1)
Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?
Question No: 116 – (Topic 1)
Which of the following terms is used to represent IPv6 addresses?
Question No: 117 – (Topic 1)
Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?
Distributed Checksum Clearinghouse
Question No: 118 – (Topic 1)
What are the advantages of stateless autoconfigration in IPv6? Each correct answer represents a part of the solution. Choose three.
No server is needed for stateless autoconfiguration.
No host configuration is necessary.
It provides basic authentication to determine which systems can receive configuration data
Ease of use.
Question No: 119 – (Topic 1)
John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we- are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
A. nc -v -n 22.214.171.124 80
B. nmap -v -O 126.96.36.199
D. nc 188.8.131.52 23
Question No: 120 – (Topic 1)
Adam works as a Security administrator for Umbrella Inc. He runs the following traceroute and notices that hops 19 and 20 both show the same IP address.
1 172.16.1.254 (172.16.1.254) 0.724 ms 3.285 ms 0.613 ms 2 ip68-98-176-
1.nv.nv.cox.net (184.108.40.206) 12.169 ms 14.958 ms 13.416 ms 3 ip68-98-176-
1.nv.nv.cox.net (220.127.116.11) 13.948 ms ip68-100-0-1.nv.nv. cox.net (18.104.22.168)
16.743 ms 16.207 ms 4 ip68-100-0-137.nv.nv.cox.net (22.214.171.124) 17.324 ms 13.933
ms 20.938 ms 5 126.96.36.199 (188.8.131.52) 12.439 ms 220.166 ms 204.170 ms
6 so-6-0-0.gar2.wdc1.Level3.net (184.108.40.206) 16.177 ms 25.943 ms 14.104 ms 7
unknown.Level3.net (220.127.116.11) 14.227 ms 17.553 ms 15.415 ms quot;PassGuidequot; –
8 so-0-1-0.bbr1.NewYork1.level3.net (18.104.22.168) 17.063 ms 20.960 ms 19.512 ms 9
so-7-0-0.gar1. NewYork1.Level3.net (22.214.171.124) 20.334 ms 19.440 ms 17.938 ms
net (126.96.36.199) 27.526 ms 18.317 ms 21.202 ms 11 uunet-level3- oc48.NewYork1.Level3.net
(188.8.131.52) 21.411 ms 19.133 ms 18.830 ms 12 0.so-6-0-0.XL1.NYC4.ALTER.NET
21.203 ms 22.670 ms 20.111 ms 13 0.so-2-0-0.TL1.NYC8.ALTER.NET (184.108.40.206)
30.929 ms 24.858 ms
23.108 ms 14 0.so-4-1-0.TL1.ATL5.ALTER.NET (220.127.116.11) 37.894 ms 33.244 ms
33.910 ms 15 0.so-7-0-0.XL1.MIA4.ALTER.NET (18.104.22.168) 51.165 ms 49.935 ms
49.466 ms 16 0.so-3-0-0.XR1.MIA4.ALTER.
NET (22.214.171.124) 50.937 ms 49.005 ms 51.055 ms 17 117.ATM6-
0.GW5.MIA1.ALTER.NET (126.96.36.199) 51.897 ms 50.280 ms 53.647 ms 18
customer.alter.net (188.8.131.52) 51.921 ms 51.571 ms 56.855 ms 19
www.PassGuide.com (184.108.40.206) 52.191 ms 52.571 ms 56.855 ms 20
www.PassGuide.com (220.127.116.11) 53.561 ms 54.121 ms 58.333 ms Which of the following is the most like cause of this issue?
A stateful inspection firewall
An application firewall
Network Intrusion system
Intrusion Detection System
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|