Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

GPPA GIAC Certified Perimeter Protection Analyst Questions and Answers

Questions 4

Paul works as a Technical Representative in a CSIRT for ABC Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Paul wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis.

Which of the following is the correct order for searching data on a Windows based system?

Options:

A.

Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system.

B.

Volatile data, file slack, registry, memory dumps, file system, system state backup, internet traces.

C.

Volatile data, file slack, file system, registry, memory dumps, system state backup, internet traces.

D.

Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps.

Buy Now
Questions 5

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.

Stateful firewall

B.

Proxy-based firewall

C.

Endian firewall

D.

Packet filter firewall

Buy Now
Questions 6

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data.

Which of the following tools can he use to accomplish the task?

Options:

A.

Hunt

B.

Mendax

C.

Alchemy Remote Executor

D.

Ettercap

Buy Now
Questions 7

Which of the following proxy servers is also referred to as transparent proxies or forced proxies?

Options:

A.

Intercepting proxy server

B.

Anonymous proxy server

C.

Reverse proxy server

D.

Tunneling proxy server

Buy Now
Questions 8

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively.

Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:

A.

Mac OS

B.

Windows XP

C.

MINIX 3

D.

Linux

Buy Now
Questions 9

You work as a Network Administrator for ABC Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address.

Which of the following types of addresses will you choose?

Options:

A.

Local-link

B.

Site-local

C.

Global unicast

D.

Loopback

Buy Now
Questions 10

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

Options:

A.

Cipher Block Chaining (CBC) Mode

B.

Electronic Codebook (ECB) Mode

C.

Propagating Cipher Block Chaining (PCBC) Mode

D.

Cipher Feedback (CFB) Mode

Buy Now
Questions 11

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process.

Which of the following actions will you take for this?

Options:

A.

Install a host-based IDS

B.

Enable verbose logging on the firewall

C.

Install a DMZ firewall

D.

Install a network-based IDS

Buy Now
Questions 12

Which of the following describes the term inside global in NAT configuration?

Options:

A.

It is a local MAC address assigned to a host in a private network.

B.

It is the data that comes inside a local network from an external host.

C.

It is a local IP address assigned to a host in a private network.

D.

It is the registered (public) IP address that represents the inside hosts in private network to the outside network.

Buy Now
Questions 13

The stateful firewalls combine the significant flows into conversations.

Which of the following properties is used to classify a flow?

Each correct answer represents a part of the solution. (Choose all that apply.)

Options:

A.

Destination port

B.

Source port

C.

Source address

D.

Protocol

E.

Destination address

Buy Now
Questions 14

You are the Network Administrator for a college. Wireless access is widely used at the college. You want the most secure wireless connections you can have.

Which of the following would you use?

Options:

A.

WEP

B.

WPA2

C.

WPA

D.

WEP2

Buy Now
Questions 15

Fill in the blank with the appropriate tool name.

______________ is a network protocol analyzer tool that is used to capture packet data from an existing network or examine packet data from a pre-saved file.

Options:

A.

Compound attack objects

B.

TShark

C.

Blowfish

D.

Wingate

Buy Now
Questions 16

Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

Options:

A.

Sniffer

B.

tcptraceroute

C.

Fpipe

D.

tcptrace

Buy Now
Questions 17

Which of the following fields are specified when rules are created for the Network Honeypot rulebase?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

A destination/service match condition

B.

Detection settings

C.

Response options

D.

Operation mode

Buy Now
Questions 18

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.

Which of the following tools can you use to accomplish the task?

Options:

A.

P0f

B.

Superscan

C.

Nmap

D.

NBTscan

Buy Now
Questions 19

Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

Teardrop attack

B.

Land attack

C.

Ping of Death attack

D.

SYN flood attack

Buy Now
Questions 20

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.

Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

Options:

A.

Policy-based detection

B.

Honey pot detection

C.

Anomaly-based detection

D.

Signature-based detection

Buy Now
Questions 21

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

Options:

A.

Sniffer

B.

Dsniff

C.

Snort

D.

Nikto

Buy Now
Questions 22

Which of the following can be applied as countermeasures against DDoS attacks?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Blocking IP address.

B.

Using the network-ingress filtering.

C.

Using LM hashes for passwords.

D.

Using Intrusion detection systems.

E.

Limiting the amount of network bandwidth.

Buy Now
Questions 23

Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

Options:

A.

Snort

B.

NetWitness

C.

Wireshark

D.

Netresident

Buy Now
Questions 24

Which of the following responsibilities does not come under the audit process?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Reviewing the results of the audit procedures.

B.

Reporting all facts and circumstances of the irregular and illegal acts.

C.

Planning the IT audit engagement based on the assessed level of risk.

D.

Applying security policies.

Buy Now
Questions 25

Which of the following is the module of OpenSER?

Options:

A.

TShark

B.

Sipsak

C.

WireShark

D.

SipTrace

Buy Now
Questions 26

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone.

Which of the following commands will you use to accomplish the task?

Options:

A.

Dnscmd /config /enableglobalnames 1

B.

Dnscmd /config /globalnamesqueryorder 0

C.

Dnscmd /config /enableglobalnamessupport 1

D.

Dnscmd /config /enableglobalnamessupport 0

Buy Now
Questions 27

Which of the following address translation types only translates one (and only one) IP address to another without using ports?

Options:

A.

Dynamic NAT

B.

NAT

C.

PAT

D.

Static NAT

Buy Now
Questions 28

You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack.

Which of the following logs will you review to accomplish the task?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Event logs

B.

System logs

C.

Web server logs

D.

Program logs

Buy Now
Questions 29

Which of the following has a set of system-independent functions for packet capture and network analysis?

Options:

A.

WinDump

B.

WinPcap

C.

libpcap

D.

tcpdump

Buy Now
Questions 30

Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of testing the security of www.abc.com. Jain notices that the ABC network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants.

Which of the following cryptographic algorithms is being used by the ABC server?

Options:

A.

RSA

B.

Blowfish

C.

Diffie-Hellman

D.

Twofish

Buy Now
Questions 31

Which of the following files is a Cisco IOS configuration file that resides in RAM?

Options:

A.

temp-config

B.

running-config

C.

startup-config

D.

ram-config

Buy Now
Questions 32

Which of the following tools is described below?

It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

Options:

A.

Dsniff

B.

Cain

C.

Libnids

D.

LIDS

Buy Now
Questions 33

Which of the following types of firewall functions at the Session layer of Open System Interconnection (OSI) model?

Options:

A.

Circuit-level firewall

B.

Switch-level firewall

C.

Application-level firewall

D.

Packet filtering firewall

Buy Now
Questions 34

You work as a Security Administrator for ABC Inc. You have implemented and configured a web application security scanner in the company's network. It helps in the automated review of the web applications with the defined purpose of discovering security vulnerabilities. In order to perform this task, the web application security scanner examines a number of vulnerabilities.

What are these vulnerabilities?

Each correct answer represents a complete solution. (Choose three.)

Options:

A.

Input/Output validation

B.

Denials of service against the TCP/IP stack

C.

Server configuration mistakes/errors/version

D.

Specific application problems

Buy Now
Questions 35

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate computer of an unfaithful employee of SecureEnet Inc. Suspect's computer runs on Windows operating system.

Which of the following sources will Adam investigate on a Windows host to collect the electronic evidences?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Slack spaces

B.

Swap files

C.

Unused and hidden partition

D.

Allocated cluster

Buy Now
Questions 36

Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-to-peer attacks when the laptops are used in public access network? (Choose two.)

Options:

A.

Use protocol analyzer

B.

Use security protocols

C.

Use firewall

D.

Use Port Address Translation

Buy Now
Questions 37

Which of the following commands configures a router to encrypt all passwords entered after the command has been executed, as well as all passwords already on the running configuration?

Options:

A.

no service password-encryption

B.

service password-encryption

C.

enable password-encryption

D.

no enable password-encryption

Buy Now
Questions 38

Jain works as a contract Ethical Hacker. He has recently got a project to do security checking for www.abc.com. He wants to find out the operating system of the ABC server in the information gathering step.

Which of the following commands will he use to accomplish the task?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

nc -v -n 208.100.2.25 80

B.

nmap -v -O www.abc.com

C.

nmap -v -O 208.100.2.25

D.

nc 208.100.2.25 23

Buy Now
Questions 39

You send and receive messages on Internet. A man-in-the-middle attack can be performed to capture and read your message.

Which of the following Information assurance pillars ensures the security of your message or data against this type of attack?

Options:

A.

Confidentiality

B.

Data availability

C.

Authentication

D.

Non-repudiation

Buy Now
Questions 40

You work as a Network Administrator for Net World Inc. You have configured a few routers on the company's network. You are required to accomplish the following goals:

• Encrypt all service passwords immediately.

• Ensure that encryption is also applied on the passwords changed in the future.

You run the following command service password-encryption.

Which of the goals will this action accomplish?

Options:

A.

The action will accomplish neither of the goals.

B.

The action will encrypt all passwords immediately.

C.

The action will accomplish both the goals.

D.

The action will ensure that encryption is also applied on the passwords changed in the future.

Buy Now
Questions 41

Which of the following is used as a default port by the TELNET utility?

Options:

A.

21

B.

80

C.

20

D.

23

Buy Now
Questions 42

You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline.

This type of IDS is called __________.

Options:

A.

Signature Based

B.

Reactive IDS

C.

Anomaly Based

D.

Passive IDS

Buy Now
Exam Code: GPPA
Exam Name: GIAC Certified Perimeter Protection Analyst
Last Update: Jul 1, 2025
Questions: 285

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now GPPA testing engine

PDF (Q&A)

$31.5  $104.99
buy now GPPA pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 05 Jul 2025