Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GCFW GIAC Certified Firewall Analyst Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GCFW GIAC Certified Firewall Analyst certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 5 / 6
Total 391 questions

Which of the following address translation types only translates one (and only one) IP address to another without using ports?

A.

NAT

B.

Dynamic NAT

C.

PAT

D.

Static NAT

Which of the following vulnerability scanners is used to test Web servers for dangerous files/CGIs, outdated server software, and other problems?

A.

Nikto

B.

Nmap

C.

Hackbot

D.

Nessus

Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?

A.

0

B.

1

C.

F

D.

2

Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

A.

Snort

B.

SUDO

C.

Apache

D.

SSH

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

A.

Neighbor Advertisement

B.

Neighbor Solicitation

C.

Router Solicitation

D.

Router Advertisement

Which of the following is used as a default port by the TELNET utility?

A.

80

B.

20

C.

21

D.

23

You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices. What will you do?

A.

Implement an ACL.

B.

Implement a firewall.

C.

Implement a dynamic NAT.

D.

Implement a WIPS.

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

A.

IPsec

B.

Firewall

C.

ACL

D.

NAT

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

A.

Fragmentation overwrite attack

B.

Insertion attack

C.

Fragmentation overlap attack

D.

Evasion attack

A Proxy firewall, also known as Application Gateway Firewall, filters information at which of the following layers of the OSI reference model?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Transport layer

B.

Physical layer

C.

Presentation layer

D.

Application layer

Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

A.

Loopback

B.

Unicast

C.

Multicast

D.

Anycast

Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?

A.

Cookies

B.

Sam Spade

C.

ACL

D.

NIDS

Which of the following commands in MQC tool matches IPv4 and IPv6 packets when IP parameter is missing?

A.

Match cos

B.

Match access-group

C.

Match IP precedence

D.

Match fr-dlci

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

A.

True negative

B.

False negative

C.

False positive

D.

True positive

Which of the following attacks sends false ICMP packets in an attempt to cripple a system using random fake Internet source addresses?

A.

Twinge attack

B.

Replay attack

C.

Land attack

D.

SYN attack

David works as the Security Manager for PassGuide Inc. He has been assigned a project to detect the attacks over multiple connections and sessions and to count the number of scanned ports in a defined time period. Which of the following rulebases will he use to accomplish the task?

A.

Traffic Anomalies rulebase

B.

Exempt rulebase

C.

SYN Protector rulebase

D.

Network Honeypot rulebase

Which of the following statements about Access control list (ACL) is true?

Each correct answer represents a complete solution. Choose three.

A.

Extended IP Access Control List permits or denies packets only from a specific source IP addresses.

B.

Standard IP Access Control List permits or denies packets only from specific source IP addr esses.

C.

Standard IP Access Control List can be used to permit or deny traffic from a specific source IP addresses or for a specific destination IP address, and port.

D.

Extended IP Access Control List permits or denies traffic from a specific source IP addresses or for a specific destination IP address, and port.

E.

Access control list filters packets or network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces.

You work as a Network Adminstrator at PassGuide Inc. You want to implement a solution that will automatically disallow connections if an attack is suspected. Which of the following technologies will you choose to accomplish the task?

A.

ACL

B.

IPS

C.

SRTP

D.

IIS

Which of the following fields are specified when rules are created for the Network Honeypot

rulebase?

Each correct answer represents a complete solution. Choose all that apply.

A.

A destination/service match condition

B.

Detection settings

C.

Operation mode

D.

Response options

Fill in the blank with the appropriate tool name.

__________ consists of flexible system architecture that provides a proper way for conducting industrial audits when it is required to identify unique positions of items.

Page: 5 / 6
Total 391 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved