New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GPPA - GIAC Certified Perimeter Protection Analyst

Page: 8 / 9
Total 285 questions

You run the tcpdump command line utility and get a report produced by tcpdump.

What information does this report include?

Each correct answer represents a complete solution. (Choose three.)

A.

Packets captured

B.

Packets dropped by kernel

C.

Packets discarded

D.

Packets received by filter

Which of the following methods will allow data to be sent on the Internet in a secure format?

A.

Browsing

B.

Virtual Private Networks

C.

Serial Line Interface Protocol

D.

Point-to-Point Protocol

Which of the following statements are true about the Network Honeypot a rulebase?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

Its operation setting toggles between the network honeypot on and off.

B.

Its rules are triggered when a source IP address sends a connection request to the destination IP address and service specified in the rule.

C.

It does not support any IP action.

D.

It is used to detect reconnoitering activities.

Which of the following tools detects certain types of packet filters and NAT setups?

A.

Passive OS fingerprinting

B.

TShark

C.

Vulnerability scanner

D.

Wireshark

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?

A.

HTTP

B.

UDP

C.

SSL

D.

IPSec

Which of the following is the default port for POP3?

A.

80

B.

25

C.

21

D.

110

Which of the following protocols is used by voice over IP (VoIP) applications?

A.

IPv6

B.

TCP

C.

ICMP

D.

UDP

Which of the following IPv4 to IPv6 transition methods uses encapsulation of IPv6 packets to traverse IPv4 networks?

A.

Translation

B.

Stack

C.

Tunneling

D.

Dual-stack

Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function.

Under which of the following controls does audit control come?

A.

Protective controls

B.

Reactive controls

C.

Detective controls

D.

Preventive controls

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

• It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.

• It is commonly used for the following purposes:

a) War driving

b) Detecting unauthorized access points

c) Detecting causes of interference on a WLAN

d) WEP ICV error tracking

e) Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

A.

THC-Scan

B.

Kismet

C.

Absinthe

D.

NetStumbler