Certbus > GIAC > GIAC Certification > GPPA > GPPA Online Practice Questions and Answers

GPPA Online Practice Questions and Answers

Questions 4

David works as the Security Manager for ABC Inc. He has been assigned a project to detect the attacks over multiple connections and sessions and to count the number of scanned ports in a defined time period.

Which of the following rulebases will he use to accomplish the task?

A. SYN Protector rulebase

B. Exempt rulebase

C. Traffic Anomalies rulebase

D. Network Honeyport rulebase

Browse 285 Q&As
Questions 5

Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?

A. Overclocking

B. Dynamic NAT

C. Overloading

D. Static NAT

Browse 285 Q&As
Questions 6

Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

A. Apache

B. Snort

C. SSH

D. SUDO

Browse 285 Q&As
Questions 7

Which of the following is a valid IPv6 address?

A. 45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE

B. 45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

C. 123.111.243.123

D. 45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE

Browse 285 Q&As
Questions 8

Poplu works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Poplu started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution.

Which of the following data should be recorded in this documentation?

Each correct answer represents a complete solution. (Choose all that apply.)

A. Date and time of incident

B. Names of the victims

C. Nature of harassment

D. Location of each incident

Browse 285 Q&As
Questions 9

Which of the following types of Intrusion Detection Systems consists of an agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state?

A. APIDS

B. PIDS

C. NIDS

D. HIDS

Browse 285 Q&As
Questions 10

Jain works as a Security Manager for ABC Inc. The company has a Windows-based network.

Jain has been assigned a project to detect the services used by an attack to access the network. For this purpose, he is required to use the predefined service objects of the rulebase. This predefined service object defines the services used in the attack to access the network.

Which of the following objects will he create when he finds that the attack is not defined in the predefined service objects?

A. Custom service objects

B. Compound attack objects

C. Signature attack objects

D. Protocol anomaly attack objects

Browse 285 Q&As
Questions 11

Fill in the blank with the appropriate tool name.

__________ consists of flexible system architecture that provides a proper way for conducting industrial audits when it is required to identify unique positions of items.

A. Network-based IDS

B. Baseline audit

C. Active IDS

D. Honey pot detection

Browse 285 Q&As
Questions 12

In which of the following ways can you use the snort tool?

A. Virus, Keylogger, and Packet logger

B. Worm, Sniffer, and Password cracker

C. Firewall, Sniffer, and Keylogger

D. IDS, Packet logger, and Sniffer

Browse 285 Q&As
Questions 13

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.

It is commonly used for the following purposes:

a) War driving b) Detecting unauthorized access points c) Detecting causes of interference on a WLAN d) WEP ICV error tracking e) Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

A. THC-Scan

B. Kismet

C. Absinthe

D. NetStumbler

Browse 285 Q&As
Questions 14

Which of the following types of vulnerability scanners performs a black-box test?

A. Port scanner

B. Web application security scanner

C. CGI scanner

D. Network scanner

Browse 285 Q&As
Questions 15

Sam works as a Network Administrator for Gentech Inc. He has been assigned a project to develop the

rules that define the IDP policy in the rulebase.

Which of the following will he define as the components of the IDP policy rule?

Each correct answer represents a complete solution. (Choose all that apply.)

A. IDP Profiler

B. IDP rule notifications

C. IDP rule IP actions

D. IDP appliance deployment mode

Browse 285 Q&As
Questions 16

You work as a Network Security Administrator for NetPerfect Inc. The company has a Windowsbased network. You are in charge of the data and network security of the company. While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential data.

What type of threat is this?

A. Zombie

B. External threat

C. Malware

D. Internal threat

Browse 285 Q&As
Questions 17

Jony works as the Security Manager in ABC Inc. He wants to protect his network from a variant of the Denial-of-Service (DoS) attack. When the rulebase is enabled for protection, the IDP engine checks the traffic that exceeds the traffic thresholds.

Which of the following rulebases is used for this purpose?

A. Traffic Anomalies rulebase

B. Backdoor rulebase

C. Exempt rulebase

D. SYN Protector rulebase

Browse 285 Q&As
Questions 18

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks.

Which of the following measures will you take over the site network devices of the network?

A. Disable the SSID broadcast feature of the router.

B. Apply firewalls at appropriate spots.

C. Download and install new firmware patch for the router.

D. Apply a standard ACL on the router.

Browse 285 Q&As
Exam Code: GPPA
Exam Name: GIAC Certified Perimeter Protection Analyst
Last Update: May 15, 2024
Questions: 285 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99