GIAC GPPA - GIAC Certified Perimeter Protection Analyst
You run the tcpdump command line utility and get a report produced by tcpdump.
What information does this report include?
Each correct answer represents a complete solution. (Choose three.)
Which of the following methods will allow data to be sent on the Internet in a secure format?
Which of the following statements are true about the Network Honeypot a rulebase?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following tools detects certain types of packet filters and NAT setups?
Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?
Which of the following is the default port for POP3?
Which of the following protocols is used by voice over IP (VoIP) applications?
Which of the following IPv4 to IPv6 transition methods uses encapsulation of IPv6 packets to traverse IPv4 networks?
Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function.
Under which of the following controls does audit control come?
This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:
• It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.
• It is commonly used for the following purposes:
a) War driving
b) Detecting unauthorized access points
c) Detecting causes of interference on a WLAN
d) WEP ICV error tracking
e) Making Graphs and Alarms on 802.11 Data, including Signal Strength
This tool is known as __________.
