Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
GCFW Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Examcollection GIAC GCFW Dumps with VCE and PDF 181-190

October 2, 2017

EnsurePass
2017 Sep GIAC Official New Released GCFW
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFW.html

GIAC Certified Firewall Analyst

Question No: 181 – (Topic 2)

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

  1. ACL

  2. Firewall

  3. NAT

  4. IPsec

Answer: C

Question No: 182 – (Topic 2)

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

  1. DES

  2. IDEA

  3. RC4

  4. Blowfish

Answer: A,B,D

Question No: 183 – (Topic 2)

Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?

  1. WinPcap

  2. Netfilter

  3. tcpdump

  4. iptables

Answer: C

Question No: 184 – (Topic 2)

Passive OS fingerprinting (POSFP) is configured in an organization#39;s network in order to improve the alert output by reporting some information. Which of the following information does it include?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Source of the OS identification

  2. Relevancy to the victim in the alert

  3. Network security device

  4. Victim OS

Answer: A,B,D

Question No: 185 – (Topic 2)

Which of the following actions can be taken as the countermeasures against the ARP spoofing attack?

Each correct answer represents a complete solution. Choose all that apply.

  1. Placing static ARP entries on servers and routers

  2. Looking for large amount of ARP traffic on local subnets

  3. Using Private VLANs

  4. Using 8 digit passwords for authentication

Answer: A,B,C

Question No: 186 – (Topic 2)

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. You have searched all open ports of the we-are-secure server.

Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of the following tools can you use to accomplish the task?

  1. NBTscan

  2. Nmap

  3. P0f

  4. Superscan

Answer: C

Question No: 187 – (Topic 2)

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Follow the rules of evidence and never temper with the evidence.

  2. Examine original evidence and never rely on the duplicate evidence.

  3. Never exceed the knowledge base of the forensic investigation.

  4. Prepare a chain of custody and handle the evidence carefully.

Answer: A,B,C,D

Question No: 188 – (Topic 2)

Which of the following types of Intrusion Detection Systems consists of an agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state?

  1. PIDS

  2. APIDS

  3. HIDS

  4. NIDS

Answer: C

Question No: 189 – (Topic 2)

You work as a Firewall Analyst in the Tech Perfect Inc. The company has a Linux-based environment. You have installed and configured netfilter/iptables on all computer systems. What are the main features of netfilter/iptables?

Each correct answer represents a complete solution. Choose all that apply.

  1. It includes many plug-ins or modules in #39;patch-o-matic#39; repository.

  2. It includes a number of layers of API#39;s for third party extensions.

  3. It offers stateless and stateful packet filtering with both IPv4 and IPv6 addressing schemes

  4. It provides network address and port address translations with both IPv4 and IPv6 addressing schemes.

Answer: A,B,C

Question No: 190 – (Topic 2)

You work as a Security Administrator for Tech Perfect Inc. You have implemented and configured a web application security scanner in the company#39;s network. It helps in the automated review of the web applications with the defined purpose of discovering security vulnerabilities. In order to perform this task, the web application security scanner examines a number of vulnerabilities.

What are these vulnerabilities?

Each correct answer represents a complete solution. Choose three.

  1. Input/Output validation

  2. Server configuration mistakes/errors/version

  3. Specific application problems

  4. Denials of service against the TCP/IP stack

Answer: A,B,C

100% Free Download!
Download Free Demo:GCFW Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GCFW Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE