GIAC GPPA - GIAC Certified Perimeter Protection Analyst
Which of the following statements about Access control list (ACL) are true?
Each correct answer represents a complete solution. (Choose three.)
Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network. Andrew is therefore assigned the task to recover the deleted mails.
Which of the following tools can Andrew use to accomplish the task?
Each correct answer represents a complete solution. (Choose two.)
Which of the following tools uses PDA and barcode technologies in order to enable effective identification, control, and reporting of items in a site?
Which of the following devices are used to implement Network Address Translation (NAT)?
Which of the following can be used in an extended access list to filter traffic?
Each correct answer represents a part of the solution. (Choose all that apply.)
Which of the following commands in MQC tool matches IPv4 and IPv6 packets when IP parameter is missing?
Which of the following files is a Cisco IOS configuration file that resides in RAM?
Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?
Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel between two networked devices.
Which of the following features are supported by Secure Shell?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following is an attack with IP fragments that cannot be reassembled?