Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GPPA GIAC Certified Perimeter Protection Analyst Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GPPA GIAC Certified Perimeter Protection Analyst certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 5
Total 285 questions

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner.

Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

A.

IPsec

B.

NAT

C.

ACL

D.

Firewall

Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

A.

Dynamic NAT

B.

Static NAT

C.

Cache NAT

D.

Port Address Translation (PAT)

You want to create a binary log file using tcpdump.

Which of the following commands will you use?

A.

tcpdump -d

B.

tcpdump -B

C.

tcpdump -dd

D.

tcpdump -w

Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

A.

Multicast

B.

Anycast

C.

Unicast

D.

Loopback

You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks.

Which of the following applications will you use to accomplish the task?

A.

Network enumerator

B.

Port scanner

C.

Web application security scanner

D.

Computer worm

A company named Tech Perfect Inc. has a TCP/IP based network. An IPS sensor is deployed in the network and configured to operate in promiscuous mode. IP blocking functionality works there in order to stop traffic from an attacking host and it helps in analyzing what happens in the network. The management wants to initiate a persistent connection with the managed devices until the block is removed.

Which of the following will you configure in the network to accomplish the task?

A.

Access Control List

B.

Firewall

C.

Network Admission Control

D.

Virtual LAN

You work as a Network Administrator at ABC Inc. You want to implement a solution that will automatically disallow connections if an attack is suspected.

Which of the following technologies will you choose to accomplish the task?

A.

ACL

B.

SRTP

C.

IPS

D.

IIS

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices.

Which of the following protocols is used by VPN for tunneling?

A.

L2TP

B.

IPSec

C.

HTTPS

D.

SSL

Which of the following commands configures a router to encrypt all passwords entered after the command has been executed, as well as all passwords already on the running configuration?

A.

no service password-encryption

B.

service password-encryption

C.

enable password-encryption

D.

no enable password-encryption

Jain works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.abc.com.

He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the ABC server.

To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus.

Which of the following IDS evasion attacks is John performing?

A.

Evasion attack

B.

Polymorphic shell code attack

C.

Insertion attack

D.

Session splicing attack

Which of the following tools detects certain types of packet filters and NAT setups?

A.

Passive OS fingerprinting

B.

TShark

C.

Vulnerability scanner

D.

Wireshark

Which of the following is a maintenance protocol that permits routers and host computers to swap basic control information when data is sent from one computer to another?

A.

IGMP

B.

BGP

C.

SNMP

D.

ICMP

Which of the following is known as DNS spoofing?

A.

Malicious cache poisoning

B.

Trojan horse

C.

Smurf attack

D.

Social engineering

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel.

Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

DES

B.

Blowfish

C.

RC4

D.

IDEA

Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com.

He has successfully completed the following steps of the preattack phase:

>> Information gathering

>> Determining network range

>> Identifying active machines

>> Finding open ports and applications

>> OS fingerprinting

>> Fingerprinting services

Now Jain wants to perform network mapping of the ABC network.

Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. (Choose all that apply.)

A.

Traceroute

B.

Cheops

C.

NeoTrace

D.

Ettercap

Which of the following libraries does TShark use to capture traffic from the first available network interface?

A.

bcap

B.

dcap

C.

scap

D.

pcap

Which of the following attacks generates falsified information within an IP header?

A.

Web spoofing attack

B.

DNS spoofing attack

C.

IP spoofing attack

D.

ARP spoofing attack

Which of the following devices is used to identify out-of-date software versions, applicable patches, system upgrades, etc?

A.

Retinal scanner

B.

Vulnerability scanner

C.

Fingerprint reader

D.

Smart card reader

The general form of the Cisco IOS is a.b.c.de.

Which of the following indicates the major version number of the Cisco IOS?

A.

b

B.

a

C.

e

D.

d

Which of the following techniques correlates information found on multiple hard drives?

A.

Live analysis

B.

Gap analysis

C.

Data analysis

D.

Cross-drive analysis

Page: 1 / 5
Total 285 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved