Weekend Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GPPA - GIAC Certified Perimeter Protection Analyst

Page: 6 / 9
Total 285 questions

When client data is encapsulated into an LWAPP header, the wireless LAN controller improves the coverage areas.

Which information does the wireless LAN controller check?

Each correct answer represents a part of the solution. (Choose two.)

A.

RSSI

B.

SNR

C.

WCS

D.

CCA

Which of the following applications cannot proactively detect anomalies related to a computer?

A.

NIDS

B.

HIDS

C.

Anti-virus scanner

D.

Firewall installed on the computer

Which of the following is a valid IPv6 address?

A.

45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE

B.

45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

C.

123.111.243.123

D.

45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

A.

Host Intrusion Detection System (HIDS)

B.

Network Intrusion Detection System (NIDS)

C.

Man trap

D.

Biometric device

Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?

A.

Sam Spade

B.

ACL

C.

Cookies

D.

NIDS

Which of the following Linux file systems is a journaled file system?

A.

ext4

B.

ext3

C.

ext

D.

ext2

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command.

Which of the following commands will you use?

A.

ping -l

B.

ping -t

C.

ping -a

D.

ping -n

Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?

A.

IPS

B.

NIDS

C.

HIDS

D.

DMZ

Which of the following fields is NOT included in packet fragmentation?

A.

Identification

B.

Flag

C.

Time to Live

D.

Fragment Offset

Which of the following command-line utilities is used to show the state of current TCP/IP connections?

A.

NETSTAT

B.

TRACERT

C.

NSLOOKUP

D.

PING