[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 131-140

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!

GIAC Certified Firewall Analyst

Question No: 131 – (Topic 1)

Which of the following vulnerability scanners is used to test Web servers for dangerous files/CGIs, outdated server software, and other problems?

  1. Nikto

  2. Hackbot

  3. Nmap

  4. Nessus

Answer: A

Question No: 132 – (Topic 1)

You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?

  1. ping -l

  2. ping -t

  3. ping -a

  4. ping -4

Answer: A

Question No: 133 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the preattack phase successfully:

l Information gathering

l Determination of network range l Identification of active systems

l Location of open ports and applications

Now, which of the following tasks should he perform next?

  1. Install a backdoor to log in remotely on the We-are-secure server.

  2. Map the network of We-are-secure Inc.

  3. Perform OS fingerprinting on the We-are-secure network.

  4. Fingerprint the services running on the we-are-secure network.

Answer: C

Question No: 134 – (Topic 1)

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

Which of the following tools can be used as a countermeasure to such an attack?

Ensurepass 2017 PDF and VCE

  1. Kismet

  2. Absinthe

  3. SmashGuard

  4. Obiwan

Answer: C

Question No: 135 – (Topic 1)

An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network. Which of the following processes does

an IDS perform?

Each correct answer represents a complete solution. Choose all that apply.

  1. Event log analysis

  2. Monitoring and analysis of user and system activity

  3. Statistical analysis of abnormal traffic patterns

  4. Network traffic analysis

Answer: A,B,C,D

Question No: 136 – (Topic 1)

You work as a Network Administrator for BlueTech Inc. You want to configure Snort as an IDS for your company#39;s wireless network, but you are concerned that Snort does not support all types of traffic. What traffic does Snort support?

Each correct answer represents a complete solution. Choose all that apply.

  1. UDP

  2. TCP

  3. IP

  4. ICMP

Answer: A,B,C,D

Question No: 137 – (Topic 1)

Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?

  1. iptables

  2. WinPcap

  3. Netfilter

  4. tcpdump

Answer: D

Question No: 138 – (Topic 1)

You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline. This type of IDS is called .

  1. Reactive IDS

  2. Signature Based

  3. Passive IDS

  4. Anomaly Based

Answer: D

Question No: 139 – (Topic 1)

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

  1. PCAP

  2. WinPCap

  3. libpcap

  4. SysPCap

Answer: B

Question No: 140 – (Topic 1)

A remote-access VPN offers secured and encrypted connections between mobile or remote users and their corporate network across public networks. Which of the following does the remote-access VPN use for offering these types of connections?

Each correct answer represents a complete solution. Choose two.

  1. SSL

  2. IPsec

  3. TLS

  4. SSH

Answer: A,B

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.