Exam Details

  • Exam Code
    :GPPA
  • Exam Name
    :GIAC Certified Perimeter Protection Analyst
  • Certification
    :GIAC Certification
  • Vendor
    :GIAC
  • Total Questions
    :285 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Certification GPPA Questions & Answers

  • Question 31:

    You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices.

    Which of the following protocols is used by VPN for tunneling?

    A. L2TP

    B. IPSec

    C. HTTPS

    D. SSL

  • Question 32:

    Which of the following tools uses PDA and barcode technologies in order to enable effective identification, control, and reporting of items in a site?

    A. Biometric device

    B. Smart card

    C. Baseline audit

    D. Vulnerability scanner

  • Question 33:

    Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past.

    Which of the following statements are true about external threats?

    Each correct answer represents a complete solution. (Choose three.)

    A. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

    B. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

    C. These are the threats that originate from within the organization.

    D. These are the threats intended to flood a network with large volumes of access requests.

  • Question 34:

    In which of the following attacks does an attacker change the MAC address on the sniffer to one that is the same in another system on the local subnet?

    A. MAC duplicating

    B. IP spoofing

    C. ARP spoofing

    D. MAC flooding

  • Question 35:

    Which of the following is a hardware/software platform that is designed to analyze, detect and report on security related events.

    NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

    A. NIDS

    B. HIDS

    C. HIPS

    D. NIPS

  • Question 36:

    In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

    A. Fragmentation overwrite attack

    B. Fragmentation overlap attack

    C. Evasion attack

    D. Insertion attack

  • Question 37:

    Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool.

    Which of the following tools is Adam using?

    A. HxD

    B. Vedit

    C. WinHex

    D. Evidor

  • Question 38:

    Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

    A. Dynamic NAT

    B. Static NAT

    C. Cache NAT

    D. Port Address Translation (PAT)

  • Question 39:

    Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

    A. Intrusion detection system (IDS)

    B. Firewall

    C. Demilitarized zone (DMZ)

    D. Packet filtering

  • Question 40:

    In which of the following conditions is the SYN Protector rule base activated in passive mode?

    A. When the number of SYN packets per second is equal to 13,425 (default).

    B. When the number of SYN packets per second is greater than the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.

    C. Only when the number of SYN packets per second is equal to the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.

    D. When the number of SYN packets per second is smaller than the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GPPA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.