[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 211-220

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!

GIAC Certified Firewall Analyst

Question No: 211 – (Topic 2)

In which of the following steps of firewall log analysis process is aggregation for nodes defined?

  1. View transformation

  2. Assess available data

  3. Visual transformation

  4. Process information

Answer: A

Question No: 212 – (Topic 2)

The general form of the Cisco IOS is a.b.c.de. Which of the following indicates the major version number of the Cisco IOS?

  1. b

  2. e

  3. d

  4. a

Answer: D

Question No: 213 – (Topic 2)

Which of the following commands can change the IOS to be loaded in a router?

  1. load system

  2. reload system

  3. reboot system

  4. boot system

Answer: D

Question No: 214 – (Topic 2)

Which of the following files is a Cisco IOS configuration files that resides in RAM?

  1. running-config

  2. startup-config

  3. temp-config

  4. ram-config

Answer: A

Question No: 215 – (Topic 2)

Which of the following program loads IOS image into RAM?

  1. Bootstrap

  2. POST

  3. TFTP

  4. NVRAM

Answer: A

Question No: 216 – (Topic 2)

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

  1. portsentry

  2. libnids

  3. nmap

  4. scanlogd

Answer: A,B,D

Question No: 217 – (Topic 2)

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

  1. Signature-based

  2. Network-based

  3. Anomaly-based

  4. File-based

Answer: C

Question No: 218 – (Topic 2)

Which of the following tools can be used as a Linux vulnerability scanner that is capable of identifying operating systems and network services?

Each correct answer represents a complete solution. Choose all that apply.

  1. Cheops-ng

  2. Fport

  3. Elsave

  4. Cheops

Answer: A,D

Question No: 219 – (Topic 2)

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

  1. Replay attack

  2. ARP spoofing

  3. DoS attack

  4. Rainbow attack

Answer: C

Question No: 220 – (Topic 2)

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6?

Each correct answer represents a complete solution. Choose all that apply.

  1. Unicast

  2. Anycast

  3. Multicast

  4. Broadcast

Answer: A,B,C

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.