Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

GPPA PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

GPPA PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: GIAC Certified Perimeter Protection Analyst
  • Last Update: Apr 27, 2024
  • Questions and Answers: 285
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

GPPA Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

GPPA Practice Exam Questions with Answers GIAC Certified Perimeter Protection Analyst Certification

Question # 6

Which of the following is a console-based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system?

A.

Kismet

B.

Hping2

C.

Nemesis

D.

Scapy

Full Access
Question # 7

Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?

A.

MAK ID

B.

IP address

C.

IP identification number

D.

SSID

Full Access
Question # 8

Which of the following techniques is used to identify attacks originating from a botnet?

A.

Recipient filtering

B.

BPF-based filter

C.

IFilter

D.

Passive OS fingerprinting

Full Access
Question # 9

You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted.

What tool would you use to accomplish this?

A.

Password cracker

B.

Performance Monitor

C.

Packet sniffer

D.

Vulnerability analyzer

Full Access
Question # 10

Which of the following is the function of the editcap utility of Wireshark?

A.

To analyze data packets.

B.

To remove duplicate packets.

C.

To transfer data packets.

D.

To check data packets.

Full Access
Question # 11

Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

A.

Sniffer

B.

tcptraceroute

C.

Fpipe

D.

tcptrace

Full Access
Question # 12

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

A.

Signature-based IDS

B.

Passive IDS

C.

Network-based IDS

D.

Active IDS

Full Access
Question # 13

Which of the following devices are used to implement Network Address Translation (NAT)?

A.

Routers and switches

B.

Routers and firewalls

C.

Firewalls and file servers

D.

Switches and firewalls

Full Access
Question # 14

Which of the following tools can be used for passive OS fingerprinting?

A.

nmap

B.

dig

C.

tcpdump

D.

ping

Full Access
Question # 15

You work as a Forensic Investigator.

Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. (Choose all that apply.)

A.

Follow the rules of evidence and never temper with the evidence.

B.

Prepare a chain of custody and handle the evidence carefully.

C.

Never exceed the knowledge base of the forensic investigation.

D.

Examine original evidence and never rely on the duplicate evidence.

Full Access
Question # 16

Which of the following firewalls filters the traffic based on the header of the datagram?

A.

Circuit-level firewall

B.

Application-level firewall

C.

Packet filtering firewall

D.

Stateful inspection firewall

Full Access
Question # 17

You run the tcpdump command line utility and get a report produced by tcpdump.

What information does this report include?

Each correct answer represents a complete solution. (Choose three.)

A.

Packets captured

B.

Packets dropped by kernel

C.

Packets discarded

D.

Packets received by filter

Full Access
Question # 18

Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers.

Which of the following programs can Mark use to fulfill this requirement?

A.

Wingate

B.

Microsoft Internet Security & Acceleration Server (ISA)

C.

Sniffer

D.

SOCKS

Full Access
Question # 19

As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com.

Which of the following nmap switches have you used to accomplish the task?

A.

nmap -sS

B.

nmap -sT

C.

nmap -vO

D.

nmap -sO

Full Access
Question # 20

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks.

Which of the following measures will you take over the site network devices of the network?

A.

Disable the SSID broadcast feature of the router.

B.

Apply firewalls at appropriate spots.

C.

Download and install new firmware patch for the router.

D.

Apply a standard ACL on the router.

Full Access
Question # 21

Which of the following TShark options is used to set capture buffer size in MB?

A.

-F

B.

-B

C.

-G

D.

-C

Full Access
Question # 22

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it.

By default, which of the following standard ports does the SSH protocol use for connection?

A.

21

B.

443

C.

80

D.

22

Full Access
Question # 23

Which of the following are packet filtering tools for the Linux operating system?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

IPTables

B.

IPFilter

C.

Zone Alarm

D.

BlackICE

Full Access
Question # 24

Which of the following tools can be used for OS fingerprinting?

A.

whois

B.

DIG

C.

netstat

D.

nmap

Full Access
Question # 25

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.

Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

A.

Policy-based detection

B.

Honey pot detection

C.

Anomaly-based detection

D.

Signature-based detection

Full Access
Question # 26

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

A.

Intrusion detection system (IDS)

B.

Firewall

C.

Demilitarized zone (DMZ)

D.

Packet filtering

Full Access
Question # 27

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

GPPA question answer

Which of the following tools can be used as a countermeasure to such an attack?

A.

SmashGuard

B.

Obiwan

C.

Kismet

D.

Absinthe

Full Access
Question # 28

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

A.

Cipher Block Chaining (CBC) Mode

B.

Electronic Codebook (ECB) Mode

C.

Propagating Cipher Block Chaining (PCBC) Mode

D.

Cipher Feedback (CFB) Mode

Full Access
Question # 29

Which of the following components are used in the implementation of a wireless intrusion prevention system?

Each correct answer represents a part of the solution. (Choose three.)

A.

Sensor

B.

Console

C.

Analyzer

D.

Server

Full Access
Question # 30

You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks.

Which of the following applications will you use to accomplish the task?

A.

Network enumerator

B.

Port scanner

C.

Web application security scanner

D.

Computer worm

Full Access
Question # 31

You are implementing passive OS fingerprinting in a network.

Which of the following aspects are required to be configured there?

Each correct answer represents a part of the solution. (Choose all that apply.)

A.

Edit signature vulnerable OS lists.

B.

Enable passive analysis.

C.

Define and import OS mappings.

D.

Define event action rules filters using the OS relevancy value of the target.

E.

Limit the attack relevance rating calculation to a specific IP address range.

Full Access
Question # 32

You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based routed network. Two routers have been configured on the network. A router receives a packet.

Which of the following actions will the router take to route the incoming packet?

Each correct answer represents a part of the solution. (Choose two.)

A.

Read the source IP address.

B.

Add the path covered by the packet to the routing table.

C.

Use the routing table to determine the best path to the destination network address.

D.

Read the destination IP address.

E.

Use the routing table to determine the best path to the source network address.

Full Access
Question # 33

Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function.

Under which of the following controls does audit control come?

A.

Protective controls

B.

Reactive controls

C.

Detective controls

D.

Preventive controls

Full Access
Question # 34

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner.

Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

A.

IPsec

B.

NAT

C.

ACL

D.

Firewall

Full Access
Question # 35

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server.

Which of the following tools will John use to accomplish his task?

A.

PsList

B.

Fpipe

C.

Cain

D.

PsExec

Full Access
Question # 36

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP network. You have been assigned a task to configure security mechanisms for the network of the company. You have decided to configure a packet filtering firewall.

Which of the following may be the reasons that made you choose a packet filtering firewall as a security mechanism?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

It is easy to install packet filtering firewalls in comparison to the other network security solutions.

B.

It makes security transparent to end-users which provide easy use of the client applications.

C.

It prevents application-layer attacks.

D.

It easily matches most of the fields in Layer 3 packets and Layer 4 segment headers, and thus, provides a lot of flexibility in implementing security policies.

Full Access
Question # 37

You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline.

This type of IDS is called __________.

A.

Signature Based

B.

Reactive IDS

C.

Anomaly Based

D.

Passive IDS

Full Access
Question # 38

Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of testing the security of www.abc.com. Jain notices that the ABC network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants.

Which of the following cryptographic algorithms is being used by the ABC server?

A.

RSA

B.

Blowfish

C.

Diffie-Hellman

D.

Twofish

Full Access
Question # 39

Fill in the blank with the appropriate tool name.

______________ is a network protocol analyzer tool that is used to capture packet data from an existing network or examine packet data from a pre-saved file.

A.

Compound attack objects

B.

TShark

C.

Blowfish

D.

Wingate

Full Access
Question # 40

Which of the following Wireless LAN standard devices is least affected by interference from domestic appliances such as microwave ovens?

A.

802.11a

B.

802.11b

C.

802.11

D.

802.11g

Full Access
Question # 41

Which of the following program loads IOS image into RAM?

A.

POST

B.

NVRAM

C.

Bootstrap

D.

TFTP

Full Access
Question # 42

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

• It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.

• It is commonly used for the following purposes:

a) War driving

b) Detecting unauthorized access points

c) Detecting causes of interference on a WLAN

d) WEP ICV error tracking

e) Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

A.

THC-Scan

B.

Kismet

C.

Absinthe

D.

NetStumbler

Full Access