GIAC GPPA - GIAC Certified Perimeter Protection Analyst
WinDump, tcpdump, and Wireshark specify which fields of information libpcap should record.
Which of the following filters do they use in order to accomplish the task?
Which of the following configuration schemes in IPv6 allows a client to automatically configure its own IP address with or without IPv6 routers?
You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based routed network. Two routers have been configured on the network. A router receives a packet.
Which of the following actions will the router take to route the incoming packet?
Each correct answer represents a part of the solution. (Choose two.)
Which of the following tools can be used as a Linux vulnerability scanner that is capable of identifying operating systems and network services?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?
Adam works as a Network Administrator for ABC Inc. He wants to prevent the network from DOS attacks.
Which of the following is most useful against DOS attacks?
Suppose you are working as a Security Administrator at ABC Inc. The company has a switched network. You have configured tcpdump in the network which can only see traffic addressed to itself and broadcast traffic.
What will you do when you are required to see all traffic of the network?
An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner.
Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?
Which of the following statements about segmentation of a network using router is true?
Each correct answer represents a complete solution. (Choose three.)
Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?
