New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pearson GCFW New Attempt

Page: 5 / 15
Total 391 questions

GIAC Certified Firewall Analyst Questions and Answers

Question 17

Which of the following is known as DNS spoofing?

Options:

A.

Trojan horse

B.

Social engineering

C.

Malicious cache poisoning

D.

Smurf attack

Question 18

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Prepare a chain of custody and handle the evidence carefully.

B.

Examine original evidence and never rely on the duplicate evidence.

C.

Follow the rules of evidence and never temper with the evidence.

D.

Never exceed the knowledge base of the forensic investigation.

Question 19

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command. Which of the following commands will you use?

Options:

A.

ping -a

B.

ping -l

C.

ping -n

D.

ping –t

Question 20

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of John notices that the We-are-secure network is vulnerable to a man-inthe- middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the Weare- secure server?

Options:

A.

Diffie-Hellman

B.

Blowfish

C.

RSA

D.

Twofish

Page: 5 / 15
Total 391 questions