[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 161-170

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFW.html

GIAC Certified Firewall Analyst

Question No: 161 – (Topic 2)

Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel between two networked devices. Which of the following features are supported by Secure Shell?

Each correct answer represents a complete solution. Choose all that apply.

  1. SSH can transfer files using the associated HTTP or FTP protocols.

  2. SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections.

  3. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.

  4. SSH uses the client-server model.

Answer: B,C,D

Question No: 162 – (Topic 2)

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as .

  1. False negative

  2. False positive

  3. True negative

  4. True positive

Answer: B

Question No: 163 – (Topic 2)

Which of the following can provide security against man-in-the-middle attack?

  1. Anti-virus programs

  2. Strong data encryption during travel

  3. Strong authentication method

  4. Firewall

Answer: B

Question No: 164 – (Topic 2)

Which of the following is used to provide hook handling facility within the Linux kernel in order to capture and manipulate network packets?

  1. Tcpdump

  2. WinDump

  3. Netfilter

  4. WinPcap

Answer: C

Question No: 165 – (Topic 2)

Which of the following statements about Access control list (ACL) is true? Each correct answer represents a complete solution. Choose three.

  1. Extended IP Access Control List permits or denies packets only from a specific source IP addresses.

  2. Standard IP Access Control List permits or denies packets only from specific source IP addr esses.

  3. Standard IP Access Control List can be used to permit or deny traffic from a specific source IP addresses or for a specific destination IP address, and port.

  4. Extended IP Access Control List permits or denies traffic from a specific source IP addresses or for a specific destination IP address, and port.

  5. Access control list filters packets or network traffic by controlling whether routed packets are forwarded or blocked at the router#39;s interfaces.

Answer: B,D,E

Question No: 166 – (Topic 2)

You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer. While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command. What is the cause of the issue?

  1. Windows Firewall blocks the command line tools.

  2. Core Networking Firewall rules do not allow ICMPv4 or ICMPv6 Echo Requests.

  3. Core Networking Firewall rules do not allow IPv4 or IPv6.

  4. Windows Firewall rules do not allow Core Networking Tools.

Answer: B

Question No: 167 – (Topic 2)

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

  1. DES

  2. IDEA

  3. Blowfish

  4. RC4

Answer: A,B,C

Question No: 168 – (Topic 2)

Which of the following features does the Nmap utility have?

Each correct answer represents a complete solution. Choose all that apply.

  1. It has a stealth approach to scanning and sweeping.

  2. It identifies services running on systems in a specified range of IP addresses using scanning and sweeping feature.

  3. It uses operating system fingerprinting technology to identify the operating system running on a target system.

  4. It is a location where an organization can easily view the event of a disaster, such as fire, flood, terrorist threat, or other disruptive events.

Answer: A,B,C

Question No: 169 – (Topic 2)

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

  1. Social engineering

  2. Smurf

  3. Man-in-the-middle

  4. Denial-of-Service

Answer: A

Question No: 170 – (Topic 2)

You work as a Network Administrator for SmartCert Inc. The company#39;s network contains five Windows 2003 servers and ninety Windows XP Professional client computers. You want to view all the incoming requests to an Internet Information Services (IIS) server and allow only requests that comply with a rule set, created by you, to be processed. You also want to detect the intrusion attempts by recognizing the strange characters in a URL on a Web server. What will you do to accomplish the task?

  1. Configure a connection to the SQL database by using the RELOG command-line utility.

  2. Use the URLScan tool.

  3. Use the Remote Desktop Protocol (RDP).

  4. Use the HFNETCHK utility.

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.