[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 221-230

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFW.html

GIAC Certified Firewall Analyst

Question No: 221 – (Topic 2)

Which of the following parts of IP header is used to specify the correct place of the fragment in the original un-fragmented datagram?

  1. Fragment ID

  2. Fragment offset

  3. TTL

  4. Source address

Answer: B

Question No: 222 – (Topic 2)

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Cookies folder

  2. Temporary Internet Folder

  3. Download folder

  4. History folder

Answer: A,B,D

Question No: 223 – (Topic 2)

Which of the following responsibilities does not come under the audit process? Each correct answer represents a complete solution. Choose all that apply.

  1. Reporting all facts and circumstances of the irregular and illegal acts.

  2. Reviewing the results of the audit procedures.

  3. Planning the IT audit engagement based on the assessed level of risk.

  4. Applying security policies.

Answer: A,B,C

Question No: 224 – (Topic 2)

Which of the following can be used in an extended access list to filter traffic? Each correct answer represents a part of the solution. Choose all that apply.

  1. Source IP address

  2. Destination IP address

  3. Destination MAC address

  4. Protocol

  5. TCP or UDP port number

Answer: A,B,D,E

Question No: 225 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

  1. Hunt

  2. Mendax

  3. Alchemy Remote Executor

  4. Ettercap

Answer: B

Question No: 226 – (Topic 2)

Which of the following is used to provide hook handling facility within the Linux kernel in order to capture and manipulate network packets?

  1. WinDump

  2. Tcpdump

  3. WinPcap

  4. Netfilter

Answer: D

Question No: 227 – (Topic 2)

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

  1. IPsec

  2. Firewall

  3. ACL

  4. NAT

Answer: D

Question No: 228 – (Topic 2)

Which of the following is a Cisco IOS management term described in the statement below?

quot;It is the fourth digit in the configuration register and contains a hexadecimal value. The bootstrap program uses its value to choose which operating system to load into RAM.quot;

  1. Boot check

  2. Boot field

  3. Boot

  4. Boot value

Answer: B

Question No: 229 – (Topic 2)

Which of the following firewalls inspects the actual contents of packets?

  1. Application-level firewall

  2. Stateful inspection firewall

  3. Packet filtering firewall

  4. Circuit-level firewall

Answer: A

Question No: 230 – (Topic 2)

You work as a Network Administrator for a bank. For securing the bank#39;s network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network. After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed. What type of response is

the IDS giving?

  1. False Positive

  2. True Negative

  3. False Negative

  4. True Positive

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.