[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 31-40

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!

GIAC Certified Firewall Analyst

Question No: 31 – (Topic 1)

Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less.

Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router#39;s logs and notices that the unfamiliar machine has the same MAC address as his laptop.

Which of the following attacks has been occurred on the wireless network of Adam?

  1. DNS cache poisoning

  2. ARP spoofing

  3. MAC spoofing

  4. NAT spoofing

Answer: C

Question No: 32 – (Topic 1)

Which of the following attacks sends false ICMP packets in an attempt to cripple a system using random fake Internet source addresses?

  1. Land attack

  2. SYN attack

  3. Replay attack

  4. Twinge attack

    Answer: D

    Question No: 33 – (Topic 1)

    This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

    l It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.

    l It is commonly used for the following purposes:

    1. War driving

    2. Detecting unauthorized access points

    3. Detecting causes of interference on a WLAN

    4. WEP ICV error tracking

    5. Making Graphs and Alarms on 802.11 Data, including Signal Strength This tool is known as .

      1. NetStumbler

      2. Kismet

      3. THC-Scan

      4. Absinthe

Answer: A

Question No: 34 – (Topic 1)

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

  1. Install a DMZ firewall

  2. Enable verbose logging on the firewall

  3. Install a host-based IDS

  4. Install a network-based IDS

Answer: D

Question No: 35 – (Topic 1)

You are implementing passive OS fingerprinting in a network. Which of the following aspects are required to be configured there?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Edit signature vulnerable OS lists.

  2. Limit the attack relevance rating calculation to a specific IP address range.

  3. Define event action rules filters using the OS relevancy value of the target.

  4. Enable passive analysis.

  5. Define and import OS mappings.

Answer: A,B,C,E

Question No: 36 – (Topic 1)

You work as a Network Administrator for NetTech Inc. You want to prevent your network from Ping flood attacks. Which of the following protocols will you block to accomplish this task?

  1. IP

  2. PPP

  3. ICMP

  4. FTP

Answer: C

Question No: 37 – (Topic 1)

John works as the Security Manager for PassGuide Inc. He wants to create the Profiler database that stores information about the network activity at Layer 3, Layer 4, and Layer

  1. Which of the following will he use to accomplish the task?

    Each correct answer represents a complete solution. Choose all that apply.

    1. Ignore connection

    2. Session creation

    3. Protocol contexts

    4. Session teardown

Answer: B,C,D

Question No: 38 – (Topic 1)

Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address?

  1. Proxy server

  2. Application gateway

  3. Packet Filtering

  4. Circuit-level gateway

Answer: C

Question No: 39 – (Topic 1)

Sam works as a Network Administrator for Gentech Inc. He has been assigned a project to develop the rules that define the IDP policy in the rulebase. Which of the following will he define as the components of the IDP policy rule?

Each correct answer represents a complete solution. Choose all that apply.

  1. IDP Profiler

  2. IDP rule IP actions

  3. IDP appliance deployment mode

  4. IDP rule notifications

Answer: B,D

Question No: 40 – (Topic 1)

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Temporary Internet Folder

  2. History folder

  3. Download folder

  4. Cookies folder

Answer: A,B,D

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.