[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 41-50

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFW.html

GIAC Certified Firewall Analyst

Question No: 41 – (Topic 1)

When client data is encapsulated into an LWAPP header, the wireless LAN controller improves the coverage areas. Which information does the wireless LAN controller check?

Each correct answer represents a part of the solution. Choose two.

  1. CCA

  2. SNR

  3. WCS

  4. RSSI

Answer: B,D

Question No: 42 – (Topic 1)

Which of the following IPv4 fields become obsolete while removing the hop-by-hop segmentation (fragmentation) procedure from the IP header?

Each correct answer represents a part of the solution. Choose three.

  1. Fragment Offset field

  2. Datagram Length field

  3. Flags field

  4. Datagram Identification Number field

Answer: A,C,D

Question No: 43 – (Topic 1)

Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.

Which of the following protocols does the DCC use?

  1. ICMP

  2. UDP

  3. TELNET

  4. TCP

Answer: B

Question No: 44 – (Topic 1)

You are the Network Administrator for a college. Wireless access is widely used at the college. You want the most secure wireless connections you can have. Which of the following would you use?

  1. WEP2

  2. WPA

  3. WPA2

  4. WEP

Answer: C

Question No: 45 – (Topic 1)

Which of the following Wireless LAN standard devices is least affected by interference from domestic appliances such as microwave ovens?

A. 802.11b B. 802.11 C. 802.11a D. 802.11g

Answer: C

Question No: 46 CORRECT TEXT – (Topic 1)

Fill in the blank with appropriate address translation type.

A performs translation of one IP address to a different one automatically. It requires manually defining two sets of addresses on the address translation device (probably a router). One set defines which inside addresses are allowed to be translated, and the other defines what these addresses are to be translated to.

Answer: Dynamic NAT

Question No: 47 – (Topic 1)

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

  1. Cain

  2. Libnids

  3. Dsniff

  4. LIDS

Answer: C

Question No: 48 – (Topic 1)

Which of the following can be applied as countermeasures against DDoS attacks? Each correct answer represents a complete solution. Choose all that apply.

  1. Using the network-ingress filtering

  2. Limiting the amount of network bandwidth

  3. Blocking IP address

  4. Using Intrusion detection systems

  5. Using LM hashes for passwords

Answer: A,B,C,D

Question No: 49 – (Topic 1)

In which of the following conditions is the SYN Protector rule base activated in passive mode?

  1. When the number of SYN packets per second is equal to 13,425 (default)

  2. Only when the number of SYN packets per second is equal to the sum of the lower SYNs-persecond threshold and the upper SYNs-per-second threshold

  3. When the number of SYN packets per second is smaller than the sum of the lower SYNs-persecond threshold and the upper SYNs-per-second threshold

  4. When the number of SYN packets per second is greater than the sum of the lower SYNs-persecond threshold and the upper SYNs-per-second threshold

Answer: D

Question No: 50 – (Topic 1)

Which of the following statements are true about an IPv6 network?

Each correct answer represents a complete solution. Choose all that apply.

  1. It uses longer subnet masks than those used in IPv4.

  2. It increases the number of available IP addresses.

  3. For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.

  4. It provides improved authentication and security.

  5. It uses 128-bit addresses.

Answer: B,C,D,E

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.