Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?
A. IPSec
B. WPA
C. WEP
D. L2TP
The promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it.
Which of the following tools works by placing the host system network card into the promiscuous mode?
A. Sniffer
B. THC-Scan
C. NetStumbler
D. Snort
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.
You have configured an 802.11g Wireless LAN (WLAN) on your network.
Which of the following factors can deteriorate the performance and range of the WLAN?
Each correct answer represents a complete solution. (Choose all that apply.)
A. Fiberglass partitions
B. Cordless phones
C. Metal ceilings
D. Concrete walls
Which of the following can be applied as countermeasures against DDoS attacks? Each correct answer represents a complete solution. (Choose all that apply.)
A. Blocking IP address.
B. Using the network-ingress filtering.
C. Using LM hashes for passwords.
D. Using Intrusion detection systems.
E. Limiting the amount of network bandwidth.
Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. (Choose all that apply.)
A. For interoperability, IPv4 addresses use the last 32 bits of IPv6 addresses.
B. It provides improved authentication and security.
C. It uses 128-bit addresses.
D. It increases the number of available IP addresses.
E. It uses longer subnet masks than those used in IPv4.
Which of the following is a maintenance protocol that permits routers and host computers to swap basic control information when data is sent from one computer to another?
A. IGMP
B. BGP
C. SNMP
D. ICMP
Which of the following are the types of intrusion detection systems?
Each correct answer represents a complete solution. (Choose all that apply.)
A. Network intrusion detection system (NIDS)
B. Client-based intrusion detection system (CIDS)
C. Host-based intrusion detection system (HIDS)
D. Server-based intrusion detection system (SIDS)
In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?
A. Insertion
B. Fragmentation overlap
C. Fragmentation overwrite
D. Session splicing
Which of the following fields are specified when rules are created for the Network Honeypot rulebase? Each correct answer represents a complete solution. (Choose all that apply.)
A. A destination/service match condition
B. Detection settings
C. Response options
D. Operation mode
You want to create a binary log file using tcpdump. Which of the following commands will you use?
A. tcpdump -d
B. tcpdump -B
C. tcpdump -dd
D. tcpdump -w
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GPPA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.