Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GIAC Cyber Security GPPA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GPPA Premium Access

View all detail and faqs for the GPPA exam


432 Students Passed

87% Average Score

96% Same Questions
Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions
Questions # 1:

Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.

Which of the following protocols does the DCC use?

Options:

A.

TCP

B.

UDP

C.

TELNET

D.

ICMP

Questions # 2:

Which of the following firewalls operates at three layers - Layer3, Layer4, and Layer5?

Options:

A.

Dynamic packet-filtering firewall

B.

Application layer firewall

C.

Proxy firewall

D.

Circuit-level firewall

Questions # 3:

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

Options:

A.

DOS boot disk

B.

EnCase with a hardware write blocker

C.

Linux Live CD

D.

Secure Authentication for EnCase (SAFE)

Questions # 4:

You are configuring a public access wireless connection.

Which of the following is the best way to secure this connection?

Options:

A.

Not broadcasting SSID

B.

Implementing anti-virus

C.

Using MAC filtering

D.

Using WPA encryption

Questions # 5:

Adam works on a Linux system. He is using Sendmail as the primary application to transmit emails. Linux uses Syslog to maintain logs of what has occurred on the system.

Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

Options:

A.

/log/var/mailog

B.

/log/var/logd

C.

/var/log/logmail

D.

/var/log/mailog

Questions # 6:

Which of the following IPv4 to IPv6 transition methods uses encapsulation of IPv6 packets to traverse IPv4 networks?

Options:

A.

Translation

B.

Stack

C.

Tunneling

D.

Dual-stack

Questions # 7:

Which of the following tools can be used for OS fingerprinting?

Options:

A.

whois

B.

DIG

C.

netstat

D.

nmap

Questions # 8:

You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based routed network. You have recently come to know about the Slammer worm, which attacked computers in 2003 and doubled the number of infected hosts every 9 seconds or so. Slammer infected 75000 hosts in the first 10 minutes of the attack. To mitigate such security threats, you want to configure security tools on the network.

Which of the following tools will you use?

Options:

A.

Intrusion Detection Systems

B.

Anti-x

C.

Intrusion Prevention Systems

D.

Firewall

Questions # 9:

You work as a Network Administrator for ABC Inc. The company has a corporate intranet setup. A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork.

Which of the following steps will you take to accomplish the task?

Options:

A.

Block the UDP protocol through ACL.

B.

Block the IPv6 protocol through ACL.

C.

Block the TCP protocol through ACL.

D.

Block the ICMP protocol through ACL.

Questions # 10:

Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. In order to do so, he performs the following steps of the preattack phase successfully:

• Information gathering

• Determination of network range

• Identification of active systems

• Location of open ports and applications 

Now, which of the following tasks should he perform next?

Options:

A.

Install a backdoor to log in remotely on the We-are-secure server.

B.

Map the network of We-are-secure Inc.

C.

Fingerprint the services running on the we-are-secure network.

D.

Perform OS fingerprinting on the We-are-secure network.

Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.