Exam Details

  • Exam Code
    :GPPA
  • Exam Name
    :GIAC Certified Perimeter Protection Analyst
  • Certification
    :GIAC Certification
  • Vendor
    :GIAC
  • Total Questions
    :285 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Certification GPPA Questions & Answers

  • Question 41:

    Fill in the blank with the appropriate utility.

    ________ is a table-based system or structure that defines the rulesets needed to transform or filter network packets.

    A. Port Address Translation (PAT)

    B. Magic Lantern

    C. Static NAT

    D. iptables

  • Question 42:

    Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism? Each correct answer represents a complete solution. (Choose two.)

    A. Teardrop attack

    B. Land attack

    C. Ping of Death attack

    D. SYN flood attack

  • Question 43:

    Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

    A. Host-based intrusion detection system (HIDS)

    B. Protocol-based intrusion detection system (PIDS)

    C. Network intrusion detection system (NIDS)

    D. Application protocol-based intrusion detection system (APIDS)

  • Question 44:

    Which of the following protocols is used with a tunneling protocol to provide security?

    A. EAP

    B. IPSec

    C. FTP

    D. IPX/SPX

  • Question 45:

    Which of the following firewalls filters the traffic based on the header of the datagram?

    A. Circuit-level firewall

    B. Application-level firewall

    C. Packet filtering firewall

    D. Stateful inspection firewall

  • Question 46:

    Which of the following methods will allow data to be sent on the Internet in a secure format?

    A. Browsing

    B. Virtual Private Networks

    C. Serial Line Interface Protocol

    D. Point-to-Point Protocol

  • Question 47:

    Which of the following can be used to mitigate the evil twin phishing attack?

    A. Obiwan

    B. Magic Lantern

    C. SARA

    D. IPSec VPN

  • Question 48:

    Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively.

    Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

    A. Mac OS

    B. Windows XP

    C. MINIX 3

    D. Linux

  • Question 49:

    Which of the following vulnerability scanners detects vulnerabilities by actually performing attacks?

    A. Port scanner

    B. Computer worm

    C. Network enumerator

    D. Web application security scanner

  • Question 50:

    In which of the following situations does legal and authorized traffic cause an intrusion detection system

    (IDS) to generate an alert and slow down performance?

    Each correct answer represents a complete solution. (Choose all that apply.)

    A. False alert

    B. False positives

    C. False generation

    D. False illusion

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GPPA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.