Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GPPA - GIAC Certified Perimeter Protection Analyst

Page: 4 / 9
Total 285 questions

Which of the following commands can change the IOS to be loaded in a router?

A.

reload system

B.

reboot system

C.

boot system

D.

load system

Which of the following is a version of netcat with integrated transport encryption capabilities?

A.

Encat

B.

Nikto

C.

Socat

D.

Cryptcat

Which of the following statements about a host-based intrusion prevention system (HIPS) are true?

Each correct answer represents a complete solution. (Choose two.)

A.

It cannot detect events scattered over the network.

B.

It can handle encrypted and unencrypted traffic equally.

C.

It can detect events scattered over the network.

D.

It is a technique that allows multiple computers to share one or more IP addresses.

Which of the following methods is a behavior-based IDS detection method?

A.

Pattern matching detection

B.

Protocol detection

C.

Knowledge-based detection

D.

Statistical anomaly detection

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. (Choose two.)

A.

Tcpdump

B.

Ettercap

C.

Fragroute

D.

Mendax

Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack.

What can he do to accomplish this?

A.

Use an SSL certificate.

B.

Use a proxy server.

C.

Use EFS.

D.

Use a firewall.

Which of the following protocols is used by TFTP as a file transfer protocol?

A.

SMTP

B.

UDP

C.

TCP

D.

SNMP

Which of the following is the function of the editcap utility of Wireshark?

A.

To analyze data packets.

B.

To remove duplicate packets.

C.

To transfer data packets.

D.

To check data packets.

Which of the following firewalls inspects the actual contents of packets?

A.

Packet filtering firewall

B.

Stateful inspection firewall

C.

Application-level firewall

D.

Circuit-level firewall

In which of the following attacks does an attacker change the MAC address on the sniffer to one that is the same in another system on the local subnet?

A.

MAC duplicating

B.

IP spoofing

C.

ARP spoofing

D.

MAC flooding