Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCFW Exam Dumps - GIAC Certification Questions and Answers

Question # 54

Which of the following devices are used to implement Network Address Translation (NAT)?

Options:

A.

Routers and firewalls

B.

Firewalls and file servers

C.

Switches and firewalls

D.

Routers and switches

Buy Now
Question # 55

You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted. What tool would you use to accomplish this?

Options:

A.

Vulnerability analyzer

B.

Performance Monitor

C.

Password cracker

D.

Packet sniffer

Buy Now
Question # 56

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?

Options:

A.

Snort

B.

KisMAC

C.

Dsniff

D.

Kismet

Buy Now
Question # 57

You are tasked with configuring your routers with a minimum security standard that includes the following:

l A local Username and Password configured on the router

l A strong privilege mode password

l Encryption of user passwords

l Configuring telnet and ssh to authenticate against the router user database

Choose the configuration that best meets these requirements.

Options:

A.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login

B.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login local

C.

RouterA(config)#service enable-password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable secret n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login user

D.

RouterA(config)#service password-encryption

RouterA(config)#username cisco password PaS$w0Rd

RouterA(config)#enable password n56e&$te

RouterA(config)#line vty 0 4

RouterA(config-line)#login local

Buy Now
Question # 58

Which of the following tools can be used as a Linux vulnerability scanner that is capable of identifying operating systems and network services?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cheops-ng

B.

Fport

C.

Cheops

D.

Elsave

Buy Now
Question # 59

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

True negative

B.

False negative

C.

False positive

D.

True positive

Buy Now
Question # 60

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

Options:

A.

Neighbor Advertisement

B.

Neighbor Solicitation

C.

Router Solicitation

D.

Router Advertisement

Buy Now
Question # 61

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.

Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

Options:

A.

Anamoly-based detection

B.

Signature-based detection

C.

Policy-based detection

D.

Honey pot detection

Buy Now
Exam Code: GCFW
Exam Name: GIAC Certified Firewall Analyst
Last Update: Aug 24, 2025
Questions: 391
GCFW pdf

GCFW PDF

$25.5  $84.99
GCFW Engine

GCFW Testing Engine

$28.5  $94.99
GCFW PDF + Engine

GCFW PDF + Testing Engine

$40.5  $134.99