GIAC GPPA - GIAC Certified Perimeter Protection Analyst
Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address?
In which of the following conditions is the SYN Protector rule base activated in passive mode?
Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?
You work as a Network Administrator for ABC Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices.
What will you do?
Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?
