[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFW Dumps with VCE and PDF 81-90

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFW.html

GIAC Certified Firewall Analyst

Question No: 81 – (Topic 1)

Which of the following are the types of intrusion detection systems?

Each correct answer represents a complete solution. Choose all that apply.

  1. Client-based intrusion detection system (CIDS)

  2. Network intrusion detection system (NIDS)

  3. Server-based intrusion detection system (SIDS)

  4. Host-based intrusion detection system (HIDS)

Answer: B,D

Question No: 82 – (Topic 1)

You work as a Firewall Analyst in the Tech Perfect Inc. The company has a Linux-based environment. You have installed and configured netfilter/iptables on all computer systems. What are the main features of netfilter/iptables?

Each correct answer represents a complete solution. Choose all that apply.

  1. It includes many plug-ins or modules in #39;patch-o-matic#39; repository

  2. It includes a number of layers of API#39;s for third party extensions

  3. It offers stateless and stateful packet filtering with both IPv4 and IPv6 addressing schemes

  4. It provides network address and port address translations with both IPv4 and IPv6 addressing schemes

Answer: A,B,C

Question No: 83 – (Topic 1)

Which of the following protocols is used by voice over IP (VoIP) applications?

  1. ICMP

  2. IPv6

  3. UDP

  4. TCP

Answer: C

Question No: 84 – (Topic 1)

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. Choose two.

  1. Mendax

  2. Fragroute

  3. Tcpdump

  4. Ettercap

Answer: A,B

Question No: 85 – (Topic 1)

Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?

  1. Snort

  2. Cain

  3. NetStumbler

  4. AiroPeek

Answer: C

Question No: 86 – (Topic 1)

You work as a Network Troubleshooter for PassGuide Inc. You want to tunnel the IPv6 traffic across an IPv4 supporting portion of the company#39;s network. You are using the interface configuration mode for the tunnel. Which of the following IP addresses will you enter after the tunnel source command?

  1. The IPv4 address assigned to the local interface on which the tunnel is built

  2. The IPv4 address assigned to the remote interface on which the tunnel is built

  3. The IPv6 address assigned to the local tunnel interface

  4. The IPv6 address assigned to the remote tunnel interface

Answer: A

Question No: 87 – (Topic 1)

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP network. You have been assigned a task to configure a stateful packet filtering firewall to secure the network of the company. You are encountering some problems while configuring the stateful packet filtering firewall. Which of the following can be the reasons for your problems?

Each correct answer represents a complete solution. Choose all that apply.

  1. It has limited logging capabilities.

  2. It has to open up a large range of ports to allow communication.

  3. It is complex to configure.

  4. It contains additional overhead of maintaining a state table.

Answer: C,D

Question No: 88 – (Topic 1)

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

  1. The Physical layer

  2. The Presentation layer

  3. The Network layer

  4. The Data-Link layer

Answer: C

Question No: 89 – (Topic 1)

Which of the following tools can be used as a Linux vulnerability scanner that is capable of identifying operating systems and network services?

Each correct answer represents a complete solution. Choose all that apply.

  1. Cheops-ng

  2. Fport

  3. Cheops

  4. Elsave

Answer: A,C

Question No: 90 – (Topic 1)

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. You have searched all open ports of the we-are-secure server.

Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of the following tools can you use to accomplish the task?

  1. Nmap

  2. NBTscan

  3. P0f

  4. Superscan

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GCFW Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFW Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.