New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GPPA - GIAC Certified Perimeter Protection Analyst

Page: 9 / 9
Total 285 questions

Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address?

A.

Circuit-level gateway

B.

Application gateway

C.

Proxy server

D.

Packet Filtering

In which of the following conditions is the SYN Protector rule base activated in passive mode?

A.

When the number of SYN packets per second is equal to 13,425 (default).

B.

When the number of SYN packets per second is greater than the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.

C.

Only when the number of SYN packets per second is equal to the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.

D.

When the number of SYN packets per second is smaller than the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.

Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

A.

Port scanning

B.

ARP spoofing

C.

Session hijacking

D.

Man-in-the-middle

You work as a Network Administrator for ABC Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices.

What will you do?

A.

Implement a WIPS.

B.

Implement a dynamic NAT.

C.

Implement a firewall.

D.

Implement an ACL.

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

A.

DOS boot disk

B.

EnCase with a hardware write blocker

C.

Linux Live CD

D.

Secure Authentication for EnCase (SAFE)