Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GPPA - GIAC Certified Perimeter Protection Analyst

Page: 5 / 9
Total 285 questions

WinDump, tcpdump, and Wireshark specify which fields of information libpcap should record.

Which of the following filters do they use in order to accomplish the task?

A.

FIR filter

B.

IM filter

C.

Web filter

D.

Berkeley Packet Filter

Which of the following configuration schemes in IPv6 allows a client to automatically configure its own IP address with or without IPv6 routers?

A.

Stateless configuration

B.

Stateful autoconfiguration

C.

Stateful configuration

D.

Stateless autoconfiguration

You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based routed network. Two routers have been configured on the network. A router receives a packet.

Which of the following actions will the router take to route the incoming packet?

Each correct answer represents a part of the solution. (Choose two.)

A.

Read the source IP address.

B.

Add the path covered by the packet to the routing table.

C.

Use the routing table to determine the best path to the destination network address.

D.

Read the destination IP address.

E.

Use the routing table to determine the best path to the source network address.

Which of the following tools can be used as a Linux vulnerability scanner that is capable of identifying operating systems and network services?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

Cheops-ng

B.

Elsave

C.

Cheops

D.

Fport

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

A.

Signature-based IDS

B.

Passive IDS

C.

Network-based IDS

D.

Active IDS

Adam works as a Network Administrator for ABC Inc. He wants to prevent the network from DOS attacks.

Which of the following is most useful against DOS attacks?

A.

SPI

B.

Internet bot

C.

Distribute firewall

D.

Honey Pot

Suppose you are working as a Security Administrator at ABC Inc. The company has a switched network. You have configured tcpdump in the network which can only see traffic addressed to itself and broadcast traffic.

What will you do when you are required to see all traffic of the network?

A.

Connect the sniffer device to a Switched Port Analyzer (SPAN) port.

B.

Connect the sniffer device to a Remote Switched Port Analyzer (RSPAN) port.

C.

Configure Network Access Control (NAC).

D.

Configure VLAN Access Control List (VACL).

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner.

Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

A.

IPsec

B.

NAT

C.

ACL

D.

Firewall

Which of the following statements about segmentation of a network using router is true?

Each correct answer represents a complete solution. (Choose three.)

A.

Broadcast will not be forwarded to other segment through the router.

B.

Number of broadcast domains will be decreased.

C.

Filtering can be done based on layer 3 information.

D.

Segmenting of a network using router will increase latency.

Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?

A.

tcpdump -F file_name

B.

tcpdump -D file_name

C.

tcpdump -A file_name

D.

tcpdump -X file_name