Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Selected GCFW GIAC Certification Questions Answers

Page: 3 / 15
Total 391 questions

GIAC Certified Firewall Analyst Questions and Answers

Question 9

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.

Signature-based

B.

Network-based

C.

Anomaly-based

D.

File-based

Question 10

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf("%s", str).

What attack will his program expose the Web application to?

Options:

A.

Sequence++ attack

B.

SQL injection attack

C.

Cross Site Scripting attack

D.

Format string attack

Question 11

Which of the following configuration schemes in IPv6 allows a client to automatically configure its own IP address with or without IPv6 routers?

Options:

A.

Stateless configuration

B.

Stateful configuration

C.

Stateful autoconfiguration

D.

Stateless autoconfiguration

Question 12

You work as a Firewall Analyst in the Tech Perfect Inc. The company has a Linux-based environment. You have installed and configured netfilter/iptables on all computer systems. What are the main features of netfilter/iptables?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It includes many plug-ins or modules in 'patch-o-matic' repository.

B.

It includes a number of layers of API's for third party extensions.

C.

It offers stateless and stateful packet filtering with both IPv4 and IPv6 addressing schemes

D.

It provides network address and port address translations with both IPv4 and IPv6 addressing schemes.

Page: 3 / 15
Total 391 questions