Fill in the blank with the appropriate utility.
________ is a table-based system or structure that defines the rulesets needed to transform or filter network packets.
A. Port Address Translation (PAT)
B. Magic Lantern
C. Static NAT
D. iptables
Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism? Each correct answer represents a complete solution. (Choose two.)
A. Teardrop attack
B. Land attack
C. Ping of Death attack
D. SYN flood attack
Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?
A. Host-based intrusion detection system (HIDS)
B. Protocol-based intrusion detection system (PIDS)
C. Network intrusion detection system (NIDS)
D. Application protocol-based intrusion detection system (APIDS)
Which of the following protocols is used with a tunneling protocol to provide security?
A. EAP
B. IPSec
C. FTP
D. IPX/SPX
Which of the following firewalls filters the traffic based on the header of the datagram?
A. Circuit-level firewall
B. Application-level firewall
C. Packet filtering firewall
D. Stateful inspection firewall
Which of the following methods will allow data to be sent on the Internet in a secure format?
A. Browsing
B. Virtual Private Networks
C. Serial Line Interface Protocol
D. Point-to-Point Protocol
Which of the following can be used to mitigate the evil twin phishing attack?
A. Obiwan
B. Magic Lantern
C. SARA
D. IPSec VPN
Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively.
Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?
A. Mac OS
B. Windows XP
C. MINIX 3
D. Linux
Which of the following vulnerability scanners detects vulnerabilities by actually performing attacks?
A. Port scanner
B. Computer worm
C. Network enumerator
D. Web application security scanner
In which of the following situations does legal and authorized traffic cause an intrusion detection system
(IDS) to generate an alert and slow down performance?
Each correct answer represents a complete solution. (Choose all that apply.)
A. False alert
B. False positives
C. False generation
D. False illusion
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GPPA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.