A Proxy firewall, also known as Application Gateway Firewall, filters information at which of the following layers of the OSI reference model?
Each correct answer represents a part of the solution. Choose all that apply.
A. Presentation layer
B. Application layer
C. Physical layer
D. Transport layer
正解:B,D
質問 2:
Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?
A. IP address
B. IP identification number
C. MAK ID
D. SSID
正解:B
質問 3:
Which of the following fields is 13 bits long and specifies the offset of a particular fragment relative to the beginning of the original un-fragmented IP datagram?
A. Header checksum
B. Fragment offset
C. Time to live
D. Protocol
正解:B
質問 4:
Which of the following is the function of the editcap utility of Wireshark?
A. To remove duplicate packets
B. To analyze data packets
C. To transfer data packets
D. To check data packets
正解:A
質問 5:
Which of the following is used as a default port by the TELNET utility?
A. 23
B. 80
C. 21
D. 20
正解:A
質問 6:
You work as a Network Administrator for Net World Inc. You have configured a few routers on the company's network. You are required to accomplish the following goals:
l Encrypt all service passwords immediately.
l Ensure that encryption is also applied on the passwords changed in the future.
You run the following command.
Service password-encryption
Which of the goals will this action accomplish?
A. The action will accomplish neither of the goals.
B. The action will accomplish both the goals.
C. The action will encrypt all passwords immediately.
D. The action will ensure that encryption is also applied on the passwords changed in the future.
正解:B
質問 7:
Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?
A. WinHex
B. Evidor
C. HxD
D. Vedit
正解:A
Obata -
このGCFW模擬試験を解いてから望むとベストです。購入して合格するのはこれで三回目になります。いつも感謝してます。