Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GPPA GIAC Certified Perimeter Protection Analyst Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GPPA GIAC Certified Perimeter Protection Analyst certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 5
Total 285 questions

You work as a Network Architect for ABC Inc. The company has a TCP/IP based network. You have established a remote-access VPN network between mobile users and the company's network. You want to implement the following features in the remote-access VPN network:

>> Provide security for the web traffic.

>> Browser clients can support the VPN connection to a host.

Which of the following will you configure to implement the given features in the network?

A.

DACL

B.

SSL

C.

SSH

D.

IPsec

You are the Network Administrator for a college. Wireless access is widely used at the college. You want the most secure wireless connections you can have.

Which of the following would you use?

A.

WEP

B.

WPA2

C.

WPA

D.

WEP2

Which of the following attacking methods allows the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer by changing the Media Access Control address?

A.

VLAN hoping

B.

ARP spoofing

C.

IP address spoofing

D.

MAC spoofing

Which of the following types of Intrusion Detection Systems consists of an agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state?

A.

APIDS

B.

PIDS

C.

NIDS

D.

HIDS

You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world.

What tool would you use to accomplish this?

A.

Packet sniffer

B.

Network mapper

C.

Protocol analyzer

D.

A port scanner

Which of the following devices works as a transparent bridge between the wireless clients and the wired network?

A.

Hub

B.

Access point

C.

Switch

D.

Wireless router

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo.

Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

Temporary Internet Folder

B.

History folder

C.

Download folder

D.

Cookies folder

Which of the following types of IP actions are supported by an IDP rulebase? (Choose three.)

A.

Initiate rules of the rulebase

B.

Notify

C.

Drop/block session

D.

Close connection

Which of the following protocols is used by TFTP as a file transfer protocol?

A.

SMTP

B.

UDP

C.

TCP

D.

SNMP

Which of the following is an attack with IP fragments that cannot be reassembled?

A.

Password guessing attack

B.

Smurf attack

C.

Teardrop attack

D.

Dictionary attack

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

A.

True positive

B.

False negative

C.

False positive

D.

True negative

Which of the following are the reasons that network administrators use Access Control Lists?

Each correct answer represents a complete solution. (Choose two.)

A.

Removing weak user password

B.

Encrypting data to be routed

C.

Controlling VTY access into a router

D.

Filtering traffic as it passes through a router

Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?

A.

tcpdump -F file_name

B.

tcpdump -D file_name

C.

tcpdump -A file_name

D.

tcpdump -X file_name

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf("%s", str).

What attack will his program expose the Web application to?

A.

Cross Site Scripting attack

B.

Format string attack

C.

Sequence++ attack

D.

SQL injection attack

Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?

A.

Snort

B.

NetStumbler

C.

AiroPeek

D.

Cain

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

A.

Fragmentation overwrite attack

B.

Fragmentation overlap attack

C.

Evasion attack

D.

Insertion attack

Which of the following types of vulnerability scanners performs a black-box test?

A.

Port scanner

B.

Web application security scanner

C.

CGI scanner

D.

Network scanner

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server.

Which of the following tools will John use to accomplish his task?

A.

PsList

B.

Fpipe

C.

Cain

D.

PsExec

Which of the following Wireless LAN standard devices is least affected by interference from domestic appliances such as microwave ovens?

A.

802.11a

B.

802.11b

C.

802.11

D.

802.11g

A packet filtering firewall inspects each packet passing through the network and accepts or rejects it based on user-defined rules.

Based on which of the following information are these rules set to filter the packets?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

Source and destination Layer 3 address

B.

Actual data in the packet

C.

Layer 4 protocol information

D.

Interface of sent or received traffic

Page: 4 / 5
Total 285 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved