[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 151-160

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!

GIAC Certified Firewall Analyst

Question No: 151 – (Topic 2)

Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

  1. Snort

  2. SUDO

  3. Apache

  4. SSH

Answer: B

Question No: 152 – (Topic 2)

You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices. What will you do?

  1. Implement a dynamic NAT.

  2. Implement a firewall.

  3. Implement an ACL.

  4. Implement a WIPS.

Answer: D

Question No: 153 – (Topic 2)

Rick works as the Security Manager for TechPerfect Inc. He wants to continue the evaluation of rules according to the ordered list to identify matches even if a match is found. Which of the following rulebases will he use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Terminal rulebase

  2. Nonterminal rulebase

  3. Backdoor rulebase

  4. IDP rulebase

Answer: B,D

Question No: 154 – (Topic 2)

David works as the Security Manager for PassGuide Inc. He has been assigned a project to detect the attacks over multiple connections and sessions and to count the number of scanned ports in a defined time period. Which of the following rulebases will he use to accomplish the task?

  1. Traffic Anomalies rulebase

  2. Exempt rulebase

  3. SYN Protector rulebase

  4. Network Honeypot rulebase

Answer: A

Question No: 155 – (Topic 2)

Which of the following information must the fragments carry for the destination host to reassemble them back to the original unfragmented state?

Each correct answer represents a complete solution. Choose all that apply.

  1. MF flag

  2. Length of the data

  3. IP address

  4. Offset field

  5. MAC address

  6. IP identification number

Answer: A,B,D,F

Question No: 156 – (Topic 2)

Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

  1. Honeynet

  2. Research honeypot

  3. Honeyfarm

  4. Production honeypot

Answer: D

Question No: 157 – (Topic 2)

Which of the following hexadecimal values in the boot field in the configuration register

loads the first IOS file found in Flash memory?

  1. 0

  2. 1

  3. 2

  4. F

Answer: B

Question No: 158 – (Topic 2)

Which of the following is like a malicious cache poisoning where fake data is placed in the cache of the name servers?

  1. Smurf attack

  2. Host name spoofing

  3. DNS spoofing

  4. SYN flood attack

Answer: C

Question No: 159 – (Topic 2)

Which of the following configuration schemes in IPv6 allows a client to automatically configure its own IP address with or without IPv6 routers?

  1. Stateless configuration

  2. Stateful configuration

  3. Stateful autoconfiguration

  4. Stateless autoconfiguration

Answer: D

Question No: 160 – (Topic 2)

Adam works on a Linux system. He is using Sendmail as the primary application to transmit e-mails. Linux uses Syslog to maintain logs of what has occurred on the system. Which of

the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

  1. /log/var/logd

  2. /log/var/mailog

  3. /var/log/mailog

  4. /var/log/logmail

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.