Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCFW Exam Dumps - GIAC Certification Questions and Answers

Question # 14

Which of the following are the reasons that network administrators use Access Control Lists?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Encrypting data to be routed

B.

Removing weak user password

C.

Controlling VTY access into a router

D.

Filtering traffic as it passes through a router

Buy Now
Question # 15

The stateful firewalls combine the significant flows into conversations. Which of the following properties is used to classify a flow?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Destination address

B.

Source port

C.

Protocol

D.

Destination port

E.

Source address

Buy Now
Question # 16

Which of the following components are used in the implementation of a wireless intrusion prevention system?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Server

B.

Console

C.

Sensor

D.

Analyzer

Buy Now
Question # 17

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?

Options:

A.

NAT

B.

Firewall

C.

Port forwarding

D.

MAC filtering

Buy Now
Question # 18

Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?

Options:

A.

Overloading

B.

Dynamic NAT

C.

Overclocking

D.

Static NAT

Buy Now
Question # 19

Which of the following tools can be used for OS fingerprinting?

Options:

A.

nmap

B.

netstat

C.

DIG

D.

whois

Buy Now
Question # 20

Address Resolution Protocol (ARP) spoofing, also known as ARP poisoning or ARP Poison Routing (APR), is a technique used to attack an Ethernet wired or wireless network. ARP spoofing may allow an attacker to sniff data frames on a local area network (LAN), modify the traffic, or stop the traffic altogether. The principle of ARP spoofing is to send fake ARP messages to an Ethernet LAN.

What steps can be used as a countermeasure of ARP spoofing?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using ARP Guard utility

B.

Using smash guard utility

C.

Using static ARP entries on servers, workstation and routers

D.

Using ARP watch utility

E.

Using IDS Sensors to check continually for large amount of ARP traffic on local subnets

Buy Now
Question # 21

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Physical layer

B.

The Presentation layer

C.

The Network layer

D.

The Data-Link layer

Buy Now
Question # 22

You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?

Options:

A.

ping -l

B.

ping -t

C.

ping -a

D.

ping -4

Buy Now
Question # 23

Which of the following can be monitored by using the host intrusion detection system (HIDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Computer performance

B.

File system integrity

C.

Storage space on computers

D.

System files

Buy Now
Exam Code: GCFW
Exam Name: GIAC Certified Firewall Analyst
Last Update: Aug 24, 2025
Questions: 391
GCFW pdf

GCFW PDF

$25.5  $84.99
GCFW Engine

GCFW Testing Engine

$28.5  $94.99
GCFW PDF + Engine

GCFW PDF + Testing Engine

$40.5  $134.99