GIAC GPPA - GIAC Certified Perimeter Protection Analyst
Which of the following is a hardware/software platform that is designed to analyze, detect and report on security related events.
NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?
You are implementing passive OS fingerprinting in a network.
Which of the following aspects are required to be configured there?
Each correct answer represents a part of the solution. (Choose all that apply.)
Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?
Jony works as the Security Manager in ABC Inc. He wants to protect his network from a variant of the Denial-of-Service (DoS) attack. When the rulebase is enabled for protection, the IDP engine checks the traffic that exceeds the traffic thresholds.
Which of the following rulebases is used for this purpose?
Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?
An organization has a TCP/IP based network. It uses IPv6 addressing in its network. IPv6 tackles addressing and routing-table problems, and improves the protocol as well.
Which of the following statements is true about IPv6?
Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Which of the following number ranges is used for the IP Standard ACL?
