[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 261-270

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFW.html

GIAC Certified Firewall Analyst

Question No: 261 – (Topic 2)

The promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it.

Which of the following tools works by placing the host system network card into the promiscuous mode?

  1. Snort

  2. THC-Scan

  3. Sniffer

  4. NetStumbler

Answer: C

Question No: 262 – (Topic 2)

The stateful firewalls combine the significant flows into conversations. Which of the following properties is used to classify a flow?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Destination address

  2. Source port

  3. Protocol

  4. Destination port

  5. Source address

Answer: A,B,C,D,E

Question No: 263 – (Topic 2)

An organization has a TCP/IP based network. It uses IPv6 addressing in its network. IPv6 tackles addressing and routing-table problems, and improves the protocol as well. Which of the following statements is true about IPv6?

  1. It uses symmetric key encryption.

  2. Its address is 32 bits in length.

  3. It eliminates the primary need for Network Address Translation (NAT).

  4. It implements broadcasting.

Answer: C

Question No: 264 – (Topic 2)

Which of the following methods will allow data to be sent on the Internet in a secure format?

  1. Browsing

  2. Virtual Private Networks

  3. Serial Line Interface Protocol

  4. Point-to-Point Protocol

Answer: B

Question No: 265 – (Topic 2)

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Prepare a chain of custody and handle the evidence carefully.

  2. Examine original evidence and never rely on the duplicate evidence.

  3. Follow the rules of evidence and never temper with the evidence.

  4. Never exceed the knowledge base of the forensic investigation.

Answer: A,B,C,D

Question No: 266 – (Topic 2)

Which of the following is a hardware/software platform that is designed to analyze, detect and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

  1. NIPS

  2. HIPS

  3. NIDS

  4. HIDS

Answer: A

Question No: 267 – (Topic 2)

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network.

You have configured an 802.11g Wireless LAN (WLAN) on your network. Which of the following factors can deteriorate the performance and range of the WLAN?

Each correct answer represents a complete solution. Choose all that apply.

  1. Concrete walls

  2. Fiberglass partitions

  3. Metal ceilings

  4. Cordless phones

Answer: A,C,D

Question No: 268 – (Topic 2)

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

  1. DOS boot disk

  2. Linux Live CD

  3. Secure Authentication for EnCase (SAFE)

  4. EnCase with a hardware write blocker

Answer: C

Question No: 269 – (Topic 2)

Host-based IDS (HIDS) is an Intrusion Detection System that runs on the system to be monitored.

HIDS monitors only the data that it is directed to, or originates from the system on which HIDS is installed. Besides monitoring network traffic for detecting attacks, it can also monitor other parameters of the system such as running processes, file system access and integrity, and user logins for identifying malicious activities. Which of the following tools are examples of HIDS?

Each correct answer represents a complete solution. Choose all that apply.

  1. Legion

  2. BlackIce Defender

  3. Tripwire

  4. HPing

Answer: B,C

Question No: 270 – (Topic 2)

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?

  1. HTTP

  2. SSL

  3. UDP

  4. IPSec

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.