GIAC GPPA - GIAC Certified Perimeter Protection Analyst
Host-based IDS (HIDS) is an Intrusion Detection System that runs on the system to be monitored. HIDS monitors only the data that it is directed to, or originates from the system on which HIDS is installed. Besides monitoring network traffic for detecting attacks, it can also monitor other parameters of the system such as running processes, file system access and integrity, and user logins for identifying malicious activities.
Which of the following tools are examples of HIDS?
Each correct answer represents a complete solution. (Choose all that apply.)
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices.
Which of the following protocols is used by VPN for tunneling?
Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of testing the security of www.abc.com. Jain notices that the ABC network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants.
Which of the following cryptographic algorithms is being used by the ABC server?
You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack.
Which of the following logs will you review to accomplish the task?
Each correct answer represents a complete solution. (Choose all that apply.)
You have to ensure that your Cisco Router is only accessible via telnet and ssh from the following hosts and subnets:
10.10.2.103
10.10.0.0/24
Which of the following sets of commands will you use to accomplish the task?
You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks.
Which of the following applications will you use to accomplish the task?
Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?
Which of the following are the types of intrusion detection systems?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?
You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer.
While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command.
What is the cause of the issue?
