Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCFW Exam Dumps - GIAC Certification Questions and Answers

Question # 24

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

Which of the following tools can be used as a countermeasure to such an attack?

Options:

A.

Kismet

B.

Absinthe

C.

SmashGuard

D.

Obiwan

Buy Now
Question # 25

Which of the following firewalls filters the traffic based on the header of the datagram?

Options:

A.

Application-level firewall

B.

Packet filtering firewall

C.

Circuit-level firewall

D.

Stateful inspection firewall

Buy Now
Question # 26

Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?

Options:

A.

Packet collision

B.

Network enumerating

C.

Packet crafting

D.

Distributed Checksum Clearinghouse

Buy Now
Question # 27

Which of the following is a maintenance protocol that permits routers and host computers to swap basic control information when data is sent from one computer to another?

Options:

A.

ICMP

B.

SNMP

C.

IGMP

D.

BGP

Buy Now
Question # 28

Which of the following is the default port for POP3?

Options:

A.

25

B.

21

C.

80

D.

110

Buy Now
Question # 29

Choose the best explanation for the resulting error when entering the command below.

Options:

A.

The command is attempting to create a standard access list with extended access list param eters.

B.

The ACL commands should be entered from the (config-router) configuration mode.

C.

The wildcard mask is not provided for the source and destination addresses.

D.

The port number given does not correspond with the proper transport protocol.

Buy Now
Question # 30

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

Options:

A.

These are the threats that originate from within the organization.

B.

These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

C.

These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

D.

These are the threats intended to flood a network with large volumes of access requests.

Buy Now
Question # 31

John works as the Security Manager in PassGuide Inc. He wants to protect his network from a variant of the Denial-of-Service (DoS) attack. When the rulebase is enabled for protection, the IDP engine checks the traffic that exceeds the traffic thresholds. Which of the following rulebases is used for this purpose?

Options:

A.

Exempt rulebase

B.

SYN Protector rulebase

C.

Traffic Anomalies rulebase

D.

Backdoor rulebase

Buy Now
Question # 32

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

Options:

A.

Firewall

B.

IPsec

C.

ACL

D.

NAT

Buy Now
Question # 33

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police.

A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:

A.

Mac OS

B.

Linux

C.

Windows XP

D.

MINIX 3

Buy Now
Exam Code: GCFW
Exam Name: GIAC Certified Firewall Analyst
Last Update: Aug 24, 2025
Questions: 391
GCFW pdf

GCFW PDF

$25.5  $84.99
GCFW Engine

GCFW Testing Engine

$28.5  $94.99
GCFW PDF + Engine

GCFW PDF + Testing Engine

$40.5  $134.99