[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 71-80

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!

GIAC Certified Firewall Analyst

Question No: 71 – (Topic 1)

You are configuring a public access wireless connection. Which of the following is the best way to secure this connection?

  1. Not broadcasting SSID

  2. Using WPA encryption

  3. Implementing anti virus

  4. Using MAC filtering

Answer: B

Question No: 72 – (Topic 1)

Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?

  1. WEP

  2. WPA

  3. L2TP

  4. IPSec

Answer: A

Question No: 73 – (Topic 1)

Which of the following firewalls filters the traffic based on the header of the datagram?

  1. Application-level firewall

  2. Packet filtering firewall

  3. Circuit-level firewall

  4. Stateful inspection firewall

Answer: B

Question No: 74 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps

of the pre-attack phase to check the security of the We-are-secure network:

l Gathering information

l Determining the network range l Identifying active systems

Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

  1. APNIC

  2. ARIN

  3. SuperScan

  4. RIPE

Answer: C

Question No: 75 – (Topic 1)

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network.

A firewall has been configured on the network. You configure a filter on the router. You verify that SMTP operations have stopped after the recent configuration. Which of the following ports will you have to open on the router to resolve the issue?

  1. 25

  2. 80

  3. 20

  4. 21

Answer: A

Question No: 76 – (Topic 1)

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?

  1. LogIDS 1.0

  2. WIDS

  3. Snort 2.1.0

  4. NFR security

Answer: B

Question No: 77 – (Topic 1)

In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?

  1. Fragmentation overwrite

  2. Fragmentation overlap

  3. Insertion

  4. Session splicing

Answer: D

Question No: 78 – (Topic 1)

What is the easiest way to verify that name resolution is functioning properly on a TCP/IP


  1. Use the TRACERT command with the /pingname parameter.

  2. Ping the source host with its computer name.

  3. Ping the source host with its IP address.

  4. Check the IP statistics on the file server.

Answer: B

Question No: 79 – (Topic 1)

Which of the following is a Cisco IOS management term described in the statement below?

quot;It is the fourth digit in the configuration register and contains a hexadecimal value. The bootstrap program uses its value to choose which operating system to load into RAM.quot;

  1. Boot check

  2. Boot field

  3. Boot value

  4. Boot

Answer: B

Question No: 80 – (Topic 1)

Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack. What can he do to accomplish this?

  1. Use an SSL certificate.

  2. Use a proxy server.

  3. Use a firewall.

  4. Use EFS.

Answer: A

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.