[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 231-240

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!

GIAC Certified Firewall Analyst

Question No: 231 – (Topic 2)

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter?

  1. PIX firewall

  2. Virtual firewall

  3. Stateful packet filter firewall

  4. Stateless packet filter firewall

Answer: C

Question No: 232 – (Topic 2)

Which of the following is used as a default port by the TELNET utility?

  1. 80

  2. 20

  3. 21

  4. 23

Answer: D

Question No: 233 – (Topic 2)

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?

  1. SSL

  2. UDP

  3. HTTP

  4. IPSec

Answer: A

Question No: 234 – (Topic 2)

Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows- based environment. The company#39;s employees use Microsoft Outlook Express as their e- mail client program. E-mails of some employees have been deleted due to a virus attack on the network. Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools can Andrew use to accomplish the task?

Each correct answer represents a complete solution. Choose two.


  2. EventCombMT

  3. eMailTrackerPro

  4. R-mail

Answer: A,D

Question No: 235 – (Topic 2)

Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?

  1. 0

  2. 1

  3. F

  4. 2

Answer: B

Question No: 236 – (Topic 2)

You work as a Network Administrator for BlueTech Inc. You want to configure Snort as an IDS for your company#39;s wireless network, but you are concerned that Snort does not support all types of traffic. What traffic does Snort support?

Each correct answer represents a complete solution. Choose all that apply.

  1. TCP

  2. IP

  3. UDP

  4. ICMP

Answer: A,B,C,D

Question No: 237 – (Topic 2)

Rick works as the Security Manager for TechPerfect Inc. He wants to continue the evaluation of rules according to the ordered list to identify matches even if a match is found. Which of the following rulebases will he use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. IDP rulebase

  2. Backdoor rulebase

  3. Terminal rulebase

  4. Nonterminal rulebase

Answer: A,D

Question No: 238 – (Topic 2)

Which of the following group management messages is used by routers to handle the IPv6 multicast routing?

  1. OSPF

  2. IGMP

  3. ARP

  4. ICMPv6

Answer: D

Question No: 239 – (Topic 2)

You work as a Network Administrator for NetTech Inc. Your manager needs to access a particular server on the network from outside the company network. You have a registered IP address assigned to a router on the company network. Which of the following will be useful for accessing the server from outside the network?

  1. Overloading

  2. Dynamic VLAN

  3. Switch

  4. Static NAT

Answer: D

Question No: 240 – (Topic 2)

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf(quot;%squot;, str).

What attack will his program expose the Web application to?

  1. Sequence attack

  2. SQL injection attack

  3. Cross Site Scripting attack

  4. Format string attack

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.