[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 61-70

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFW.html

GIAC Certified Firewall Analyst

Question No: 61 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

  1. Hunt

  2. Ettercap

  3. Alchemy Remote Executor

  4. Mendax

Answer: D

Question No: 62 – (Topic 1)

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

  1. Nikto

  2. Sniffer

  3. Snort

  4. Dsniff

Answer: A

Question No: 63 – (Topic 1)

Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

  1. Application protocol-based intrusion detection system (APIDS)

  2. Network intrusion detection system (NIDS)

  3. Protocol-based intrusion detection system (PIDS)

  4. Host-based intrusion detection system (HIDS)

Answer: D

Question No: 64 – (Topic 1)

On which of the following interfaces of the router is the clock rate command used?

  1. DCE

  2. ETHERNET

  3. VIRTUAL LINE VTY

  4. DTE

Answer: A

Question No: 65 – (Topic 1)

A company named Tech Perfect Inc. has a TCP/IP based network. An IPS sensor is deployed in the network and configured to operate in promiscuous mode. IP blocking functionality works there in order to stop traffic from an attacking host and it helps in analyzing what happens in the network.

The management wants to initiate a persistent connection with the managed devices until the block is removed. Which of the following will you configure in the network to accomplish the task?

  1. Access Control List

  2. Firewall

  3. Network Admission Control

  4. Virtual LAN

Answer: C

Question No: 66 – (Topic 1)

Which of the following ports cannot be used to access the router from a computer?

  1. Aux port

  2. Console port

  3. Serial port

  4. Vty

Answer: C

Question No: 67 – (Topic 1)

In which of the following situations does legal and authorized traffic cause an intrusion detection system (IDS) to generate an alert and slow down performance?

Each correct answer represents a complete solution. Choose all that apply.

  1. False alert

  2. False illusion

  3. False generation

  4. False positives

Answer: A,D

Question No: 68 – (Topic 1)

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

  1. These are the threats that originate from within the organization.

  2. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

  3. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

  4. These are the threats intended to flood a network with large volumes of access requests.

Answer: B,C,D

Question No: 69 – (Topic 1)

Which of the following protocols is used with a tunneling protocol to provide security?

  1. EAP

  2. FTP

  3. IPX/SPX

  4. IPSec

Answer: D

Question No: 70 – (Topic 1)

You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company#39;s networks. Which of the following applications will you use to accomplish the task?

  1. Network enumerator

  2. Web application security scanner

  3. Computer worm

  4. Port scanner

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.