Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCFW Exam Dumps - GIAC Certification Questions and Answers

Question # 44

Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

Options:

A.

Application protocol-based intrusion detection system (APIDS)

B.

Network intrusion detection system (NIDS)

C.

Protocol-based intrusion detection system (PIDS)

D.

Host-based intrusion detection system (HIDS)

Buy Now
Question # 45

You send and receive messages on Internet. A man-in-the-middle attack can be performed to capture and read your message. Which of the following Information assurance pillars ensures the security of your message or data against this type of attack?

Options:

A.

Confidentiality

B.

Non-repudiation

C.

Data availability

D.

Authentication

Buy Now
Question # 46

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

DES

B.

IDEA

C.

Blowfish

D.

RC4

Buy Now
Question # 47

Which of the following techniques correlates information found on multiple hard drives?

Options:

A.

Cross-drive analysis

B.

Data analysis

C.

Live analysis

D.

Gap analysis

Buy Now
Question # 48

Which of the following parts of IP header is used to specify the correct place of the fragment in the original un-fragmented datagram?

Options:

A.

Fragment offset

B.

Source address

C.

TTL

D.

Fragment ID

Buy Now
Question # 49

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

Options:

A.

Cain

B.

Libnids

C.

Dsniff

D.

LIDS

Buy Now
Question # 50

Adam works as a Network Administrator for PassGuide Inc. He wants to prevent the network from DOS attacks. Which of the following is most useful against DOS attacks?

Options:

A.

Distributive firewall

B.

Honey Pot

C.

SPI

D.

Internet bot

Buy Now
Question # 51

Which of the following fields are specified when rules are created for the Network Honeypot

rulebase?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A destination/service match condition

B.

Detection settings

C.

Operation mode

D.

Response options

Buy Now
Question # 52

Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

Options:

A.

Security audit

B.

Corrective controls

C.

Audit trail

D.

Detective controls

Buy Now
Question # 53

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

Options:

A.

DOS boot disk

B.

Linux Live CD

C.

Secure Authentication for EnCase (SAFE)

D.

EnCase with a hardware write blocker

Buy Now
Exam Code: GCFW
Exam Name: GIAC Certified Firewall Analyst
Last Update: Aug 24, 2025
Questions: 391
GCFW pdf

GCFW PDF

$25.5  $84.99
GCFW Engine

GCFW Testing Engine

$28.5  $94.99
GCFW PDF + Engine

GCFW PDF + Testing Engine

$40.5  $134.99