New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

GPPA GIAC Certified Perimeter Protection Analyst Questions and Answers

Questions 4

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes.

On the basis of above information, which of the following types of attack is Adam attempting to perform?

Options:

A.

Ping of death attack

B.

SYN Flood attack

C.

Fraggle attack

D.

Land attack

Buy Now
Questions 5

Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel between two networked devices.

Which of the following features are supported by Secure Shell?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

SSH uses the client-server model.

B.

SSH can transfer files using the associated HTTP or FTP protocols.

C.

SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections.

D.

SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.

Buy Now
Questions 6

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.

Stateful firewall

B.

Proxy-based firewall

C.

Endian firewall

D.

Packet filter firewall

Buy Now
Questions 7

Which of the following vulnerability scanners is used to test Web servers for dangerous files/CGIs, outdated server software, and other problems?

Options:

A.

Hackbot

B.

Nikto

C.

Nessus

D.

Nmap

Buy Now
Questions 8

Host-based IDS (HIDS) is an Intrusion Detection System that runs on the system to be monitored. HIDS monitors only the data that it is directed to, or originates from the system on which HIDS is installed. Besides monitoring network traffic for detecting attacks, it can also monitor other parameters of the system such as running processes, file system access and integrity, and user logins for identifying malicious activities.

Which of the following tools are examples of HIDS?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

HPing

B.

Legion

C.

Tripwire

D.

BlackIce Defender

Buy Now
Questions 9

Which of the following statements are true about the Network Honeypot a rulebase?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Its operation setting toggles between the network honeypot on and off.

B.

Its rules are triggered when a source IP address sends a connection request to the destination IP address and service specified in the rule.

C.

It does not support any IP action.

D.

It is used to detect reconnoitering activities.

Buy Now
Questions 10

Which of the following can provide security against man-in-the-middle attack?

Options:

A.

Anti-virus programs

B.

Strong data encryption during travel

C.

Strong authentication method

D.

Firewall

Buy Now
Questions 11

Which of the following responsibilities does not come under the audit process?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Reviewing the results of the audit procedures.

B.

Reporting all facts and circumstances of the irregular and illegal acts.

C.

Planning the IT audit engagement based on the assessed level of risk.

D.

Applying security policies.

Buy Now
Questions 12

Which of the following devices are used to implement Network Address Translation (NAT)?

Options:

A.

Routers and switches

B.

Routers and firewalls

C.

Firewalls and file servers

D.

Switches and firewalls

Buy Now
Questions 13

Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com.

He has successfully completed the following steps of the preattack phase:

>> Information gathering

>> Determining network range

>> Identifying active machines

>> Finding open ports and applications

>> OS fingerprinting

>> Fingerprinting services

Now Jain wants to perform network mapping of the ABC network.

Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Traceroute

B.

Cheops

C.

NeoTrace

D.

Ettercap

Buy Now
Questions 14

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

Options:

A.

Signature-based IDS

B.

Passive IDS

C.

Network-based IDS

D.

Active IDS

Buy Now
Questions 15

You work as a Network Architect for Tech Perfect Inc. The company has a corporate LAN network. You will have to perform the following tasks:

• Limit events that occur from security threats such as viruses, worms, and spyware.

• Restrict access to the network based on identity or security posture.

Which of the following services will you deploy in the network to accomplish the tasks?

Options:

A.

Protocol-Independent Multicast

B.

Firewall Service Module

C.

Network Admission Control

D.

NetFlow

Buy Now
Questions 16

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

Options:

A.

Dsniff

B.

Cain

C.

Libnids

D.

LIDS

Buy Now
Questions 17

Which of the following devices works as a transparent bridge between the wireless clients and the wired network?

Options:

A.

Hub

B.

Access point

C.

Switch

D.

Wireless router

Buy Now
Questions 18

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Intrusion detection system (IDS)

B.

Firewall

C.

Demilitarized zone (DMZ)

D.

Packet filtering

Buy Now
Questions 19

What netsh command should be run to enable IPv6 routing?

Each correct answer represents a part of the solution. (Choose two.)

Options:

A.

netsh interface IPv6 show interface

B.

netsh interface IPv6 set interface

C.

netsh interface IPv6 add address

D.

netsh interface IPv6 add routes

Buy Now
Questions 20

You are tasked with configuring your routers with a minimum security standard that includes the following:

• A local Username and Password configured on the router

• A strong privilege mode password

• Encryption of user passwords

• Configuring telnet and ssh to authenticate against the router user database

Choose the configuration that meets these requirements best.

Options:

A.

RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable password n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login local

B.

RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login

C.

RouterA(config)#service enable-password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login user

D.

RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login local

Buy Now
Questions 21

An organization has a TCP/IP based network. It uses IPv6 addressing in its network. IPv6 tackles addressing and routing-table problems, and improves the protocol as well.

Which of the following statements is true about IPv6?

Options:

A.

It implements broadcasting.

B.

It eliminates the primary need for Network Address Translation (NAT).

C.

It uses symmetric key encryption.

D.

Its address is 32 bits in length.

Buy Now
Questions 22

Which of the following is a version of netcat with integrated transport encryption capabilities?

Options:

A.

Encat

B.

Nikto

C.

Socat

D.

Cryptcat

Buy Now
Questions 23

Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?

Options:

A.

MAK ID

B.

IP address

C.

IP identification number

D.

SSID

Buy Now
Questions 24

Which of the following modes is also referred to as client mode?

Options:

A.

Ad-hoc mode

B.

Manage mode

C.

Monitor mode

D.

Master mode

Buy Now
Questions 25

Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

Options:

A.

Corrective controls

B.

Audit trail

C.

Detective controls

D.

Security audit

Buy Now
Questions 26

Which of the following statements is true about ICMP packets?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

They guarantee the delivery of datagrams.

B.

They are used to report errors if a problem in IP processing occurs.

C.

The PING utility uses them to verify connectivity between two hosts.

D.

They are encapsulated within IP datagrams.

E.

They use UDP datagrams.

Buy Now
Questions 27

Which of the following describes the term inside global in NAT configuration?

Options:

A.

It is a local MAC address assigned to a host in a private network.

B.

It is the data that comes inside a local network from an external host.

C.

It is a local IP address assigned to a host in a private network.

D.

It is the registered (public) IP address that represents the inside hosts in private network to the outside network.

Buy Now
Questions 28

You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks.

Which of the following applications will you use to accomplish the task?

Options:

A.

Network enumerator

B.

Port scanner

C.

Web application security scanner

D.

Computer worm

Buy Now
Questions 29

Which of the following ports cannot be used to access the router from a computer?

Options:

A.

Console port

B.

Vty

C.

Aux port

D.

Serial port

Buy Now
Questions 30

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

Tcpdump

B.

Ettercap

C.

Fragroute

D.

Mendax

Buy Now
Questions 31

Which of the following can be used to mitigate the evil twin phishing attack?

Options:

A.

Obiwan

B.

Magic Lantern

C.

SARA

D.

IPSec VPN

Buy Now
Questions 32

What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?

Options:

A.

Use the TRACERT command with the /pingname parameter.

B.

Ping the source host with its IP address.

C.

Ping the source host with its computer name.

D.

Check the IP statistics on the file server.

Buy Now
Questions 33

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf("%s", str).

What attack will his program expose the Web application to?

Options:

A.

Cross Site Scripting attack

B.

Format string attack

C.

Sequence++ attack

D.

SQL injection attack

Buy Now
Questions 34

Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a remote location and a public IPv4 address, instead of public IPv6 address, has been assigned to the computer?

Options:

A.

6to4

B.

PortProxy

C.

Teredo

D.

ISATAP

Buy Now
Questions 35

The simplest form of a firewall is a packet filtering firewall. Typically, a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets.

On which of the following layers of the Open System Interconnection (OSI) reference model do these routers filter information?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Transport layer

B.

Data Link layer

C.

Physical layer

D.

Network layer

Buy Now
Questions 36

Which of the following number ranges is used for the IPX Standard ACL?

Options:

A.

1200-1299

B.

800-899

C.

1000-1099

D.

900-999

Buy Now
Questions 37

Which of the following statements are true about an IPv6 network?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.

B.

It provides improved authentication and security.

C.

It uses 128-bit addresses.

D.

It increases the number of available IP addresses.

E.

It uses longer subnet masks than those used in IPv4.

Buy Now
Questions 38

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

Options:

A.

SysPCap

B.

libpcap

C.

WinPCap

D.

PCAP

Buy Now
Questions 39

Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network. Andrew is therefore assigned the task to recover the deleted mails.

Which of the following tools can Andrew use to accomplish the task?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

FINALeMAIL

B.

EventCombMT

C.

R-mail

D.

eMailTrackerPro

Buy Now
Questions 40

You work as a Network Architect for ABC Inc. The company has a TCP/IP based network. You have established a remote-access VPN network between mobile users and the company's network. You want to implement the following features in the remote-access VPN network:

>> Provide security for the web traffic.

>> Browser clients can support the VPN connection to a host.

Which of the following will you configure to implement the given features in the network?

Options:

A.

DACL

B.

SSL

C.

SSH

D.

IPsec

Buy Now
Questions 41

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Data-Link layer

B.

The Physical layer

C.

The Network layer

D.

The Presentation layer

Buy Now
Questions 42

Which of the following well-known ports is used by BOOTP?

Options:

A.

UDP 67

B.

TCP 21

C.

UDP 69

D.

TCP 161

Buy Now
Exam Code: GPPA
Exam Name: GIAC Certified Perimeter Protection Analyst
Last Update: Dec 22, 2024
Questions: 285

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99