Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GCFW GIAC Certified Firewall Analyst Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GCFW GIAC Certified Firewall Analyst certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 6
Total 391 questions

You are implementing passive OS fingerprinting in a network. Which of the following aspects are required to be configured there?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Edit signature vulnerable OS lists.

B.

Limit the attack relevance rating calculation to a specific IP address range.

C.

Define event action rules filters using the OS relevancy value of the target.

D.

Enable passive analysis.

E.

Define and import OS mappings.

Which of the following terms is used to represent IPv6 addresses?

A.

Colon-dot

B.

Hexadecimal-dot notation

C.

Colon-hexadecimal

D.

Dot notation

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6?

Each correct answer represents a complete solution. Choose all that apply.

A.

Multicast

B.

Anycast

C.

Broadcast

D.

Unicast

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint. Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?

A.

nmap -O -p

B.

nmap -sT

C.

nmap -sU -p

D.

nmap -sS

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

Which of the following tools can be used as a countermeasure to such an attack?

A.

Kismet

B.

Absinthe

C.

SmashGuard

D.

Obiwan

Which of the following ports cannot be used to access the router from a computer?

A.

Aux port

B.

Console port

C.

Serial port

D.

Vty

Which of the following wireless security features provides the best wireless security mechanism?

A.

WPA with 802.1X authentication

B.

WPA with Pre Shared Key

C.

WEP

D.

WPA

Which of the following well-known ports is used by BOOTP?

A.

UDP 69

B.

TCP 161

C.

TCP 21

D.

UDP 67

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?

A.

ARP spoofing

B.

Replay attack

C.

Rainbow attack

D.

DoS attack

Which of the following statements are true about an IDP rule base notification?

A.

It can be defined as reusable logical entities that the user can apply to the rules.

B.

When an action is performed, a notification defines how to log information.

C.

It is used to specify the type of network traffic that has to be monitored for attacks.

D.

It directs an IDP to drop or close the connection.

You work as a Network Administrator for BlueTech Inc. You want to configure Snort as an IDS for your company's wireless network, but you are concerned that Snort does not support all types of traffic. What traffic does Snort support?

Each correct answer represents a complete solution. Choose all that apply.

A.

UDP

B.

TCP

C.

IP

D.

ICMP

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

A.

Hunt

B.

Ettercap

C.

Alchemy Remote Executor

D.

Mendax

Which of the following parts of IP header is used to specify the correct place of the fragment in the original un-fragmented datagram?

A.

Fragment offset

B.

Source address

C.

TTL

D.

Fragment ID

Which of the following firewalls operates at three layers- Layer3, Layer4, and Layer5?

A.

Application layer firewall

B.

Proxy firewall

C.

Dynamic packet-filtering firewall

D.

Circuit-level firewall

Sam works as a Network Administrator for Gentech Inc. He has been assigned a project to develop the rules that define the IDP policy in the rulebase. Which of the following will he define as the components of the IDP policy rule?

Each correct answer represents a complete solution. Choose all that apply.

A.

IDP Profiler

B.

IDP rule IP actions

C.

IDP appliance deployment mode

D.

IDP rule notifications

Which of the following statements about the traceroute utility are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection Systems.

B.

It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host.

C.

It records the time taken for a round trip for each packet at each router.

D.

It is an online tool that performs polymorphic shell code attacks.

You want to create a binary log file using tcpdump. Which of the following commands will you use?

A.

tcpdump -B

B.

tcpdump -w

C.

tcpdump -dd

D.

tcpdump -d

You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

A.

Local-link

B.

Global unicast

C.

Site-local

D.

Loopback

Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

A.

Fpipe

B.

tcptrace

C.

tcptraceroute

D.

Sniffer

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

A.

Electronic Codebook (ECB) Mode

B.

Cipher Block Chaining (CBC) Mode

C.

Propagating Cipher Block Chaining (PCBC) Mode

D.

Cipher Feedback (CFB) Mode

Page: 2 / 6
Total 391 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved