Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GCFW GIAC Certified Firewall Analyst Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GCFW GIAC Certified Firewall Analyst certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 6 / 6
Total 391 questions

Which of the following can provide security against man-in-the-middle attack?

A.

Anti-virus programs

B.

Strong data encryption during travel

C.

Strong authentication method

D.

Firewall

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Follow the rules of evidence and never temper with the evidence.

B.

Examine original evidence and never rely on the duplicate evidence.

C.

Never exceed the knowledge base of the forensic investigation.

D.

Prepare a chain of custody and handle the evidence carefully.

The general form of the Cisco IOS is a.b.c.de. Which of the following indicates the major version number of the Cisco IOS?

A.

b

B.

e

C.

d

D.

a

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

A.

DES

B.

IDEA

C.

Blowfish

D.

RC4

Which of the following files is a Cisco IOS configuration files that resides in RAM?

A.

running-config

B.

startup-config

C.

temp-config

D.

ram-config

Rick works as the Security Manager for TechPerfect Inc. He wants to continue the evaluation of rules according to the ordered list to identify matches even if a match is found. Which of the following rulebases will he use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

Terminal rulebase

B.

Nonterminal rulebase

C.

Backdoor rulebase

D.

IDP rulebase

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

A.

ACL

B.

Firewall

C.

NAT

D.

IPsec

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data. Which of the following tools can he use to accomplish the task?

A.

Hunt

B.

Mendax

C.

Alchemy Remote Executor

D.

Ettercap

Which of the following is a hardware/software platform that is designed to analyze, detect and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

A.

NIPS

B.

HIPS

C.

NIDS

D.

HIDS

Which of the following are open-source vulnerability scanners?

A.

Nikto

B.

Hackbot

C.

NetRecon

D.

Nessus

Which of the following attacks are prevented from a mutual authentication solution?

Each correct answer represents a complete solution. Choose all that apply.

A.

Man-in-the-middle attack

B.

Eavesdropping attack

C.

Hijacking

D.

Phishing

Which of the following can be used in an extended access list to filter traffic?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Destination MAC address

B.

Source IP address

C.

Protocol

D.

Destination IP address

E.

TCP or UDP port number

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.

You have configured an 802.11g Wireless LAN (WLAN) on your network. Which of the following factors can deteriorate the performance and range of the WLAN?

Each correct answer represents a complete solution. Choose all that apply.

A.

Concrete walls

B.

Fiberglass partitions

C.

Metal ceilings

D.

Cordless phones

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone. Which of the following commands will you use to accomplish the task?

A.

Dnscmd /config /enableglobalnamessupport 1

B.

Dnscmd /config /globalnamesqueryorder 0

C.

Dnscmd /config /enableglobalnames 1

D.

Dnscmd /config /enableglobalnamessupport 0

Which of the following is used to provide hook handling facility within the Linux kernel in order to capture and manipulate network packets?

A.

WinDump

B.

Tcpdump

C.

WinPcap

D.

Netfilter

Which of the following IPv4 fields become obsolete while removing the hop-by-hop segmentation (fragmentation) procedure from the IP header?

Each correct answer represents a part of the solution. Choose three.

A.

Datagram Identification Number field

B.

Fragment Offset field

C.

Datagram Length field

D.

Flags field

Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?

A.

iptables

B.

WinPcap

C.

tcpdump

D.

Netfilter

Page: 6 / 6
Total 391 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved