GPPA Free Questions – GIAC Certified Perimeter Protection Analyst V8.02

GIAC Certified Perimeter Protection Analyst (GPPA) is new name of GIAC Certified Firewall Analyst (GCFW) certification which effective January 1, 2014. Candidates who hold GIAC Certified Perimeter Protection Analyst GPPA certification have the knowledge, skills, and abilities to design, configure, and monitor routers, firewalls, and perimeter defense systems. We have new GPPA exam questions to help you complete GIAC GPPA certification. Today, GPPA free questions are online to help you check the high quality of GIAC Certified Perimeter Protection Analyst (GPPA) study materials.

GPPA Free Questions – GIAC Certified Perimeter Protection Analyst V8.02

1. Which of the following parts of IP header is used to specify the correct place of the fragment in the original un-fragmented datagram?

 
 
 
 

2. Which of the following applications cannot proactively detect anomalies related to a computer?

 
 
 
 

3. Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?

 
 
 
 

4. Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?

 
 
 
 

5. You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based routed network. Two routers have been configured on the network. A router receives a packet.
Which of the following actions will the router take to route the incoming packet? Each correct answer represents a part of the solution. (Choose two.)

 
 
 
 
 

6. Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?

 
 
 
 

7. Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

 
 
 
 

8. The simplest form of a firewall is a packet filtering firewall. Typically, a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets.
On which of the following layers of the Open System Interconnection (OSI) reference model do these routers filter information? Each correct answer represents a complete solution. (Choose all that apply.)

 
 
 
 

9. You work as a Security Administrator for ABC Inc. You have implemented and configured a web application security scanner in the company’s network. It helps in the automated review of the web applications with the defined purpose of discovering security vulnerabilities. In order to perform this task, the web application security scanner examines a number of vulnerabilities.
What are these vulnerabilities? Each correct answer represents a complete solution. (Choose three.)

 
 
 
 

10. Which of the following terms is used to represent IPv6 addresses?

 
 
 
 

11. Which of the following information must the fragments carry for the destination host to reassemble them back to the original unfragmented state? Each correct answer represents a complete solution. (Choose all that apply.)

 
 
 
 
 
 

12. Which of the following are open-source vulnerability scanners? (Choose three.)

 
 
 
 

13. Suppose you are working as a Security Administrator at ABC Inc. The company has a switched network. You have configured tcpdump in the network which can only see traffic addressed to itself and broadcast traffic.
What will you do when you are required to see all traffic of the network?

 
 
 
 

14. Which of the following techniques is used to identify attacks originating from a botnet?

 
 
 
 

15. John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.
Which of the following tools can you use to accomplish the task?

 
 
 
 

16. You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline.
This type of IDS is called __________.

 
 
 
 

17. Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

 
 
 
 

18. Which of the following protocols is used by TFTP as a file transfer protocol?

 
 
 
 

19. Which of the following wireless security features provides the best wireless security mechanism?

 
 
 
 

20. Which of the following monitors program activities and modifies malicious activities on a system?

 
 
 
 

21. David works as the Security Manager for ABC Inc. He has been assigned a project to detect the attacks over multiple connections and sessions and to count the number of scanned ports in a defined time period.
Which of the following rulebases will he use to accomplish the task?

 
 
 
 

22. Which of the following types of IP actions are supported by an IDP rulebase? (Choose three.)

 
 
 
 

23. You work as a Network Administrator for ABC Inc. You want to configure Snort as an IDS for your company’s wireless network, but you are concerned that Snort does not support all types of traffic.
What traffic does Snort support? Each correct answer represents a complete solution. (Choose all that apply.)

 
 
 
 

24. Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

 
 
 
 

25. Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. (Choose three.)

 
 
 
 

Leave a Reply

Your email address will not be published. Required fields are marked *