Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GPPA - GIAC Certified Perimeter Protection Analyst

Page: 2 / 9
Total 285 questions

Which of the following is a hardware/software platform that is designed to analyze, detect and report on security related events.

NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

A.

NIDS

B.

HIDS

C.

HIPS

D.

NIPS

You are implementing passive OS fingerprinting in a network.

Which of the following aspects are required to be configured there?

Each correct answer represents a part of the solution. (Choose all that apply.)

A.

Edit signature vulnerable OS lists.

B.

Enable passive analysis.

C.

Define and import OS mappings.

D.

Define event action rules filters using the OS relevancy value of the target.

E.

Limit the attack relevance rating calculation to a specific IP address range.

Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?

A.

2

B.

0

C.

1

D.

F

Jony works as the Security Manager in ABC Inc. He wants to protect his network from a variant of the Denial-of-Service (DoS) attack. When the rulebase is enabled for protection, the IDP engine checks the traffic that exceeds the traffic thresholds.

Which of the following rulebases is used for this purpose?

A.

Traffic Anomalies rulebase

B.

Backdoor rulebase

C.

Exempt rulebase

D.

SYN Protector rulebase

Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?

A.

Web proxy server

B.

Forced proxy server

C.

Open proxy server

D.

Caching proxy server

An organization has a TCP/IP based network. It uses IPv6 addressing in its network. IPv6 tackles addressing and routing-table problems, and improves the protocol as well.

Which of the following statements is true about IPv6?

A.

It implements broadcasting.

B.

It eliminates the primary need for Network Address Translation (NAT).

C.

It uses symmetric key encryption.

D.

Its address is 32 bits in length.

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

nmap

B.

portsentry

C.

libnids

D.

scanlogd

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

A.

Cipher Block Chaining (CBC) Mode

B.

Electronic Codebook (ECB) Mode

C.

Propagating Cipher Block Chaining (PCBC) Mode

D.

Cipher Feedback (CFB) Mode

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

A.

File-based

B.

Network-based

C.

Anomaly-based

D.

Signature-based

Which of the following number ranges is used for the IP Standard ACL?

A.

100-199

B.

1-99

C.

600-699

D.

1000-1099