Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GCFW GIAC Certified Firewall Analyst Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GCFW GIAC Certified Firewall Analyst certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 6
Total 391 questions

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

A.

443

B.

80

C.

22

D.

21

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

A.

IPChains

B.

Stunnel

C.

IPTables

D.

OpenSSH

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

A.

True positive

B.

False positive

C.

True negative

D.

False negative

Which of the following is a version of netcat with integrated transport encryption capabilities?

A.

Nikto

B.

Encat

C.

Cryptcat

D.

Socat

Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Under which of the following controls does audit control come?

A.

Protective controls

B.

Preventive controls

C.

Detective controls

D.

Reactive controls

What is the function of baseline audit?

A.

Packet sniffing

B.

Data capturing

C.

Packet filtering

D.

ARP spoofing

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

A.

DOS boot disk

B.

Linux Live CD

C.

Secure Authentication for EnCase (SAFE)

D.

EnCase with a hardware write blocker

An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network. Which of the following processes does an IDS perform?

Each correct answer represents a complete solution. Choose all that apply.

A.

Monitoring and analysis of user and system activity

B.

Event log analysis

C.

Network traffic analysis

D.

Statistical analysis of abnormal traffic patterns

In which of the following CAATs (Computer Assisted Auditing Techniques) does an auditor perform tests on computer files and databases?

A.

Test Data

B.

Parallel Simulation

C.

Generalized Audit Software (GAS)

D.

Custom Audit Software (CAS)

You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

Event logs

B.

Program logs

C.

System logs

D.

Web server logs

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?

A.

HTTP

B.

SSL

C.

UDP

D.

IPSec

Which of the following devices works as a transparent bridge between the wireless clients and the wired network?

A.

Access point

B.

Hub

C.

Switch

D.

Wireless router

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be most helpful against Denial of Service (DOS) attacks?

A.

Stateful Packet Inspection (SPI) firewall

B.

Packet filtering firewall

C.

Network surveys.

D.

Honey pot

Which of the following has a set of system-independent functions for packet capture and network analysis?

A.

WinPcap

B.

libpcap

C.

WinDump

D.

tcpdump

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf("%s", str).

What attack will his program expose the Web application to?

A.

Sequence++ attack

B.

SQL injection attack

C.

Cross Site Scripting attack

D.

Format string attack

Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?

A.

WinPcap

B.

Netfilter

C.

tcpdump

D.

iptables

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

A.

Signature-based

B.

Network-based

C.

Anomaly-based

D.

File-based

Which of the following statements about segmentation of a network using router is true?

Each correct answer represents a complete solution. Choose three.

A.

Filtering can be done based on layer 3 information.

B.

Segmenting of a network using router will increase latency.

C.

Number of broadcast domains will be decreased.

D.

Broadcast will not be forwarded to other segment through the router.

Which of the following are the countermeasures against a man-in-the-middle attack?

Each correct answer represents a complete solution. Choose all that apply.

A.

Using Secret keys for authentication.

B.

Using public key infrastructure authentication.

C.

Using Off-channel verification.

D.

Using basic authentication.

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

A.

PCAP

B.

WinPCap

C.

libpcap

D.

SysPCap

Page: 1 / 6
Total 391 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved