[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 171-180

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFW.html

GIAC Certified Firewall Analyst

Question No: 171 – (Topic 2)

Adam works as a Network Administrator for PassGuide Inc. He wants to prevent the network from DOS attacks. Which of the following is most useful against DOS attacks?

  1. Distributive firewall

  2. Honey Pot

  3. SPI

  4. Internet bot

Answer: C

Question No: 172 – (Topic 2)

Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

  1. Loopback

  2. Unicast

  3. Multicast

  4. Anycast

Answer: D

Question No: 173 – (Topic 2)

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes.

On the basis of above information, which of the following types of attack is Adam attempting to perform?

  1. Fraggle attack

  2. SYN Flood attack

  3. Ping of death attack

  4. Land attack

Answer: C

Question No: 174 – (Topic 2)

Which of the following fields is 13 bits long and specifies the offset of a particular fragment relative to the beginning of the original un-fragmented IP datagram?

  1. Time to live

  2. Protocol

  3. Header checksum

  4. Fragment offset

Answer: D

Question No: 175 – (Topic 2)

Which of the following command-line utilities is used to show the state of current TCP/IP

connections?

  1. PING

  2. NSLOOKUP

  3. NETSTAT

  4. TRACERT

Answer: C

Question No: 176 – (Topic 2)

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?

  1. Kismet

  2. Dsniff

  3. Snort

  4. KisMAC

Answer: C

Question No: 177 – (Topic 2)

Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-topeer attacks when the laptops are used in public access network?

  1. Use protocol analyzer

  2. Use Port Address Translation

  3. Use security protocols

  4. Use firewall

Answer: C,D

Question No: 178 – (Topic 2)

Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. Choose three.

  1. Authenticate

  2. Acquire

  3. Encrypt

  4. Analyze

Answer: A,B,D

Question No: 179 – (Topic 2)

You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices. What will you do?

  1. Implement an ACL.

  2. Implement a firewall.

  3. Implement a dynamic NAT.

  4. Implement a WIPS.

Answer: D

Question No: 180 – (Topic 2)

Which of the following tools can be used as a Linux vulnerability scanner that is capable of identifying operating systems and network services?

Each correct answer represents a complete solution. Choose all that apply.

  1. Cheops-ng

  2. Fport

  3. Elsave

  4. Cheops

Answer: A,D

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.