Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GPPA - GIAC Certified Perimeter Protection Analyst

Page: 1 / 9
Total 285 questions

Which of the following statements about Access control list (ACL) are true?

Each correct answer represents a complete solution. (Choose three.)

A.

Extended IP Access Control List permits or denies traffic from a specific source IP addresses or for a specific destination IP address, and port.

B.

Standard IP Access Control List permits or denies packets only from specific source IP addresses.

C.

Access control list filters packets or network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces.

D.

Extended IP Access Control List permits or denies packets only from a specific source IP addresses.

E.

Standard IP Access Control List can be used to permit or deny traffic from a specific source IP addresses or for a specific destination IP address, and port.

Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network. Andrew is therefore assigned the task to recover the deleted mails.

Which of the following tools can Andrew use to accomplish the task?

Each correct answer represents a complete solution. (Choose two.)

A.

FINALeMAIL

B.

EventCombMT

C.

R-mail

D.

eMailTrackerPro

Which of the following tools uses PDA and barcode technologies in order to enable effective identification, control, and reporting of items in a site?

A.

Biometric device

B.

Smart card

C.

Baseline audit

D.

Vulnerability scanner

Which of the following devices are used to implement Network Address Translation (NAT)?

A.

Routers and switches

B.

Routers and firewalls

C.

Firewalls and file servers

D.

Switches and firewalls

Which of the following can be used in an extended access list to filter traffic?

Each correct answer represents a part of the solution. (Choose all that apply.)

A.

Source IP address

B.

Protocol

C.

Destination IP address

D.

TCP or UDP port number

E.

Destination MAC address

Which of the following commands in MQC tool matches IPv4 and IPv6 packets when IP parameter is missing?

A.

Match fr-dlci

B.

Match IP precedence

C.

Match access-group

D.

Match cos

Which of the following files is a Cisco IOS configuration file that resides in RAM?

A.

temp-config

B.

running-config

C.

startup-config

D.

ram-config

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?

A.

Dsniff

B.

Kismet

C.

KisMAC

D.

Snort

Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel between two networked devices.

Which of the following features are supported by Secure Shell?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

SSH uses the client-server model.

B.

SSH can transfer files using the associated HTTP or FTP protocols.

C.

SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections.

D.

SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.

Which of the following is an attack with IP fragments that cannot be reassembled?

A.

Password guessing attack

B.

Smurf attack

C.

Teardrop attack

D.

Dictionary attack