Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

GIAC GPPA GIAC Certified Perimeter Protection Analyst Exam Practice Test

Demo: 42 questions
Total 285 questions

GIAC Certified Perimeter Protection Analyst Questions and Answers

Question 1

Which of the following is an attack with IP fragments that cannot be reassembled?

Options:

A.

Password guessing attack

B.

Smurf attack

C.

Teardrop attack

D.

Dictionary attack

Question 2

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.

Stateful firewall

B.

Proxy-based firewall

C.

Endian firewall

D.

Packet filter firewall

Question 3

Sam works as a Security Manager for ABC Inc. The company has a Windows-based network. Sam wants to prevent specific traffic from IDP processing in order to reduce false positives.

Which of the following rulebases will he use to accomplish the task?

Options:

A.

Network Honeypot rulebase

B.

Backdoor rulebase

C.

SYN Protector rulebase

D.

Exempt rulebase

Question 4

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.

Which of the following tools can you use to accomplish the task?

Options:

A.

P0f

B.

Superscan

C.

Nmap

D.

NBTscan

Question 5

As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com.

Which of the following nmap switches have you used to accomplish the task?

Options:

A.

nmap -sS

B.

nmap -sT

C.

nmap -vO

D.

nmap -sO

Question 6

Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network. Andrew is therefore assigned the task to recover the deleted mails.

Which of the following tools can Andrew use to accomplish the task?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

FINALeMAIL

B.

EventCombMT

C.

R-mail

D.

eMailTrackerPro

Question 7

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?

Options:

A.

LogIDS 1.0

B.

WIDS

C.

Snort 2.1.0

D.

NFR security

Question 8

Which of the following is used to provide hook handling facility within the Linux kernel in order to capture and manipulate network packets?

Options:

A.

WinPcap

B.

WinDump

C.

Tcpdump

D.

Netfilter

Question 9

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.

File-based

B.

Network-based

C.

Anomaly-based

D.

Signature-based

Question 10

Which of the following limits the number of packets seen by tcpdump?

Options:

A.

IFilters

B.

Sender filtering

C.

Recipient filtering

D.

BPF-based filter

Question 11

Which of the following are the types of intrusion detection systems?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Network intrusion detection system (NIDS)

B.

Client-based intrusion detection system (CIDS)

C.

Host-based intrusion detection system (HIDS)

D.

Server-based intrusion detection system (SIDS)

Question 12

Which of the following are packet filtering tools for the Linux operating system?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

IPTables

B.

IPFilter

C.

Zone Alarm

D.

BlackICE

Question 13

Which of the following is used as a default port by the TELNET utility?

Options:

A.

21

B.

80

C.

20

D.

23

Question 14

Which of the following can be used to mitigate the evil twin phishing attack?

Options:

A.

Obiwan

B.

Magic Lantern

C.

SARA

D.

IPSec VPN

Question 15

You work as a Network Architect for Tech Perfect Inc. The company has a corporate LAN network. You will have to perform the following tasks:

• Limit events that occur from security threats such as viruses, worms, and spyware.

• Restrict access to the network based on identity or security posture.

Which of the following services will you deploy in the network to accomplish the tasks?

Options:

A.

Protocol-Independent Multicast

B.

Firewall Service Module

C.

Network Admission Control

D.

NetFlow

Question 16

Which of the following has a set of system-independent functions for packet capture and network analysis?

Options:

A.

WinDump

B.

WinPcap

C.

libpcap

D.

tcpdump

Question 17

John works as a Security Manager for Gentech Inc. He uses an IDP engine to detect the type of interactive traffic produced during an attack in which the attacker wants to install the mechanism on a host system that facilitates the unauthorized access and breaks the system confidentiality.

Which of the following rulebases will he use to accomplish the task?

Options:

A.

Traffic Anomalies rulebase

B.

SYN Protector rulebase

C.

Backdoor rulebase

D.

Exempt rulebase

Question 18

You want to create a binary log file using tcpdump.

Which of the following commands will you use?

Options:

A.

tcpdump -d

B.

tcpdump -B

C.

tcpdump -dd

D.

tcpdump -w

Question 19

You work as a Network Administrator for ABC Inc. The company has a corporate intranet setup. A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork.

Which of the following steps will you take to accomplish the task?

Options:

A.

Block the UDP protocol through ACL.

B.

Block the IPv6 protocol through ACL.

C.

Block the TCP protocol through ACL.

D.

Block the ICMP protocol through ACL.

Question 20

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network.

What feature of a router would accomplish this?

Options:

A.

Firewall

B.

Port forwarding

C.

NAT

D.

MAC filtering

Question 21

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

Options:

A.

Cipher Block Chaining (CBC) Mode

B.

Electronic Codebook (ECB) Mode

C.

Propagating Cipher Block Chaining (PCBC) Mode

D.

Cipher Feedback (CFB) Mode

Question 22

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner.

Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

Options:

A.

IPsec

B.

NAT

C.

ACL

D.

Firewall

Question 23

Which of the following TShark options is used to set capture buffer size in MB?

Options:

A.

-F

B.

-B

C.

-G

D.

-C

Question 24

Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

Options:

A.

Sniffer

B.

tcptraceroute

C.

Fpipe

D.

tcptrace

Question 25

You work as a Network Troubleshooter for ABC Inc. You want to tunnel the IPv6 traffic across an IPv4 supporting portion of the company's network.

You are using the interface configuration mode for the tunnel.

Which of the following IP addresses will you enter after the tunnel source command?

Options:

A.

The IPv4 address assigned to the remote interface on which the tunnel is built.

B.

The IPv6 address assigned to the remote tunnel interface.

C.

The IPv6 address assigned to the local tunnel interface.

D.

The IPv4 address assigned to the local interface on which the tunnel is built.

Question 26

Which of the following commands in MQC tool matches IPv4 and IPv6 packets when IP parameter is missing?

Options:

A.

Match fr-dlci

B.

Match IP precedence

C.

Match access-group

D.

Match cos

Question 27

Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?

Options:

A.

Sam Spade

B.

ACL

C.

Cookies

D.

NIDS

Question 28

You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline.

This type of IDS is called __________.

Options:

A.

Signature Based

B.

Reactive IDS

C.

Anomaly Based

D.

Passive IDS

Question 29

You work as a Network Administrator for Net World Inc. You have configured a few routers on the company's network. You are required to accomplish the following goals:

• Encrypt all service passwords immediately.

• Ensure that encryption is also applied on the passwords changed in the future.

You run the following command service password-encryption.

Which of the goals will this action accomplish?

Options:

A.

The action will accomplish neither of the goals.

B.

The action will encrypt all passwords immediately.

C.

The action will accomplish both the goals.

D.

The action will ensure that encryption is also applied on the passwords changed in the future.

Question 30

Audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function.

Under which of the following controls does audit control come?

Options:

A.

Protective controls

B.

Reactive controls

C.

Detective controls

D.

Preventive controls

Question 31

The promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it.

Which of the following tools works by placing the host system network card into the promiscuous mode?

Options:

A.

Sniffer

B.

THC-Scan

C.

NetStumbler

D.

Snort

Question 32

You are tasked with configuring your routers with a minimum security standard that includes the following:

• A local Username and Password configured on the router

• A strong privilege mode password

• Encryption of user passwords

• Configuring telnet and ssh to authenticate against the router user database

Choose the configuration that meets these requirements best.

Options:

A.

RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable password n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login local

B.

RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login

C.

RouterA(config)#service enable-password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login user

D.

RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login local

Question 33

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command.

Which of the following commands will you use?

Options:

A.

ping -l

B.

ping -t

C.

ping -a

D.

ping -n

Question 34

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it.

By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

21

B.

443

C.

80

D.

22

Question 35

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks.

Which of the following measures will you take over the site network devices of the network?

Options:

A.

Disable the SSID broadcast feature of the router.

B.

Apply firewalls at appropriate spots.

C.

Download and install new firmware patch for the router.

D.

Apply a standard ACL on the router.

Question 36

You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack.

Which of the following logs will you review to accomplish the task?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Event logs

B.

System logs

C.

Web server logs

D.

Program logs

Question 37

Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.

Which of the following protocols does the DCC use?

Options:

A.

TCP

B.

UDP

C.

TELNET

D.

ICMP

Question 38

Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack.

What can he do to accomplish this?

Options:

A.

Use an SSL certificate.

B.

Use a proxy server.

C.

Use EFS.

D.

Use a firewall.

Question 39

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be most helpful against Denial of Service (DOS) attacks?

Options:

A.

Honey pot

B.

Network surveys

C.

Stateful Packet Inspection (SPI) firewall

D.

Packet filtering firewall

Question 40

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes.

On the basis of above information, which of the following types of attack is Adam attempting to perform?

Options:

A.

Ping of death attack

B.

SYN Flood attack

C.

Fraggle attack

D.

Land attack

Question 41

Which of the following number ranges is used for the IPX Standard ACL?

Options:

A.

1200-1299

B.

800-899

C.

1000-1099

D.

900-999

Question 42

Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?

Options:

A.

IPSec

B.

WPA

C.

WEP

D.

L2TP

Demo: 42 questions
Total 285 questions