Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free GCFW GIAC Updates

Page: 2 / 15
Total 391 questions

GIAC Certified Firewall Analyst Questions and Answers

Question 5

Sam works as a Security Manager for GenTech Inc. He has been assigned a project to detect reconnoitering activities. For this purpose, he has deployed a system in the network that attractsthe attention of an attacker. Which of the following rulebases will he use to accomplish the task?

Options:

A.

Network Honeypot rulebase

B.

Exempt rulebase

C.

Backdoor rulebase

D.

SYN Protector rulebase

Question 6

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone. Which of the following commands will you use to accomplish the task?

Options:

A.

Dnscmd /config /enableglobalnamessupport 1

B.

Dnscmd /config /globalnamesqueryorder 0

C.

Dnscmd /config /enableglobalnames 1

D.

Dnscmd /config /enableglobalnamessupport 0

Question 7

Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network. Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools can Andrew use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

FINALeMAIL

B.

EventCombMT

C.

eMailTrackerPro

D.

R-mail

Question 8

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

Options:

A.

Replay attack

B.

ARP spoofing

C.

DoS attack

D.

Rainbow attack

Page: 2 / 15
Total 391 questions