Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GPPA GIAC Certified Perimeter Protection Analyst Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GPPA GIAC Certified Perimeter Protection Analyst certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 5
Total 285 questions

Which of the following tools can be used for OS fingerprinting?

A.

whois

B.

DIG

C.

netstat

D.

nmap

You are implementing passive OS fingerprinting in a network.

Which of the following aspects are required to be configured there?

Each correct answer represents a part of the solution. (Choose all that apply.)

A.

Edit signature vulnerable OS lists.

B.

Enable passive analysis.

C.

Define and import OS mappings.

D.

Define event action rules filters using the OS relevancy value of the target.

E.

Limit the attack relevance rating calculation to a specific IP address range.

Which of the following commands can change the IOS to be loaded in a router?

A.

reload system

B.

reboot system

C.

boot system

D.

load system

Which of the following is the module of OpenSER?

A.

TShark

B.

Sipsak

C.

WireShark

D.

SipTrace

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter?

A.

Stateless packet filter firewall

B.

Virtual firewall

C.

PIX firewall

D.

Stateful packet filter firewall

Fill in the blank with the appropriate tool name.

______________ is a network protocol analyzer tool that is used to capture packet data from an existing network or examine packet data from a pre-saved file.

A.

Compound attack objects

B.

TShark

C.

Blowfish

D.

Wingate

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively.

Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

A.

Mac OS

B.

Windows XP

C.

MINIX 3

D.

Linux

In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?

A.

Insertion

B.

Fragmentation overlap

C.

Fragmentation overwrite

D.

Session splicing

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.

Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

A.

Policy-based detection

B.

Honey pot detection

C.

Anomaly-based detection

D.

Signature-based detection

You work as a Network Administrator for ABC Inc. The company has a corporate intranet setup. A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork.

Which of the following steps will you take to accomplish the task?

A.

Block the UDP protocol through ACL.

B.

Block the IPv6 protocol through ACL.

C.

Block the TCP protocol through ACL.

D.

Block the ICMP protocol through ACL.

In which of the following attacks does an attacker change the MAC address on the sniffer to one that is the same in another system on the local subnet?

A.

MAC duplicating

B.

IP spoofing

C.

ARP spoofing

D.

MAC flooding

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process.

Which of the following actions will you take for this?

A.

Install a host-based IDS

B.

Enable verbose logging on the firewall

C.

Install a DMZ firewall

D.

Install a network-based IDS

Suppose you are working as a Security Administrator at ABC Inc. The company has a switched network. You have configured tcpdump in the network which can only see traffic addressed to itself and broadcast traffic.

What will you do when you are required to see all traffic of the network?

A.

Connect the sniffer device to a Switched Port Analyzer (SPAN) port.

B.

Connect the sniffer device to a Remote Switched Port Analyzer (RSPAN) port.

C.

Configure Network Access Control (NAC).

D.

Configure VLAN Access Control List (VACL).

Which of the following protocols is used by voice over IP (VoIP) applications?

A.

IPv6

B.

TCP

C.

ICMP

D.

UDP

Which of the following configuration schemes in IPv6 allows a client to automatically configure its own IP address with or without IPv6 routers?

A.

Stateless configuration

B.

Stateful autoconfiguration

C.

Stateful configuration

D.

Stateless autoconfiguration

Which of the following modes is also referred to as client mode?

A.

Ad-hoc mode

B.

Manage mode

C.

Monitor mode

D.

Master mode

Which of the following can be used in an extended access list to filter traffic?

Each correct answer represents a part of the solution. (Choose all that apply.)

A.

Source IP address

B.

Protocol

C.

Destination IP address

D.

TCP or UDP port number

E.

Destination MAC address

Which of the following are the types of intrusion detection systems?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

Network intrusion detection system (NIDS)

B.

Client-based intrusion detection system (CIDS)

C.

Host-based intrusion detection system (HIDS)

D.

Server-based intrusion detection system (SIDS)

Which of the following is like a malicious cache poisoning where fake data is placed in the cache of the name servers?

A.

DNS spoofing

B.

SYN flood attack

C.

Smurf attack

D.

Host name spoofing

You work as a Network Administrator for ABC Inc. The company has a TCP/IP network. You have been assigned a task to configure a stateful packet filtering firewall to secure the network of the company. You are encountering some problems while configuring the stateful packet filtering firewall.

Which of the following can be the reasons for your problems?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

It contains additional overhead of maintaining a state table.

B.

It has limited logging capabilities.

C.

It has to open up a large range of ports to allow communication.

D.

It is complex to configure.

Page: 3 / 5
Total 285 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved