Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

GPPA Sample Questions Answers

Questions 4

Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of testing the security of www.abc.com. Jain notices that the ABC network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants.

Which of the following cryptographic algorithms is being used by the ABC server?

Options:

A.

RSA

B.

Blowfish

C.

Diffie-Hellman

D.

Twofish

Buy Now
Questions 5

Which of the following protocols does IPsec use to perform various security functions in the network?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Internet Key Exchange

B.

Authentication Header

C.

Encapsulating Security Payload

D.

Skinny Client Control Protocol

Buy Now
Questions 6

Which of the following is like a malicious cache poisoning where fake data is placed in the cache of the name servers?

Options:

A.

DNS spoofing

B.

SYN flood attack

C.

Smurf attack

D.

Host name spoofing

Buy Now
Questions 7

Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

Options:

A.

Honeynet

B.

Production honeypot

C.

Research honeypot

D.

Honeyfarm

Buy Now
Questions 8

Which of the following configuration schemes in IPv6 allows a client to automatically configure its own IP address with or without IPv6 routers?

Options:

A.

Stateless configuration

B.

Stateful autoconfiguration

C.

Stateful configuration

D.

Stateless autoconfiguration

Buy Now
Questions 9

A scenario involves a pool of users with private IP addresses who need to access the Internet; however, the company has a limited number of IP addresses and needs to ensure users occupy only one public IP address.

Which technology is used to allow a pool of users to share one global IP address for Internet access?

Options:

A.

Port Address Translation

B.

Private Address Translation

C.

Per-user Address Translation

D.

Pool Address Translation

Buy Now
Questions 10

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Pattern matching detection

B.

Protocol detection

C.

Knowledge-based detection

D.

Statistical anomaly detection

Buy Now
Questions 11

At which of the following layers of the OSI reference model does a Proxy firewall, also known as Application Gateway Firewall, filter information?

Each correct answer represents a part of the solution. (Choose all that apply.)

Options:

A.

Transport layer

B.

Physical layer

C.

Application layer

D.

Presentation layer

Buy Now
Questions 12

Adam works as a Network Administrator for ABC Inc. He wants to prevent the network from DOS attacks.

Which of the following is most useful against DOS attacks?

Options:

A.

SPI

B.

Internet bot

C.

Distribute firewall

D.

Honey Pot

Buy Now
Questions 13

Which of the following types of audit constructs a risk profile for existing and new projects?

Options:

A.

Innovative comparison audit

B.

Technological innovation process audit

C.

Technological position audit

D.

Client/Server, Telecommunications, Intranets, and Extranets audits

Buy Now
Questions 14

In which of the following situations does legal and authorized traffic cause an intrusion detection system (IDS) to generate an alert and slow down performance?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

False alert

B.

False positives

C.

False generation

D.

False illusion

Buy Now
Questions 15

You work as a Network Administrator for ABC Inc. You want to configure Snort as an IDS for your company's wireless network, but you are concerned that Snort does not support all types of traffic.

What traffic does Snort support?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

ICMP

B.

UDP

C.

TCP

D.

IP

Buy Now
Questions 16

Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack.

What can he do to accomplish this?

Options:

A.

Use an SSL certificate.

B.

Use a proxy server.

C.

Use EFS.

D.

Use a firewall.

Buy Now
Questions 17

You have to ensure that your Cisco Router is only accessible via telnet and ssh from the following hosts and subnets:

10.10.2.103

10.10.0.0/24

Which of the following sets of commands will you use to accomplish the task?

Options:

A.

access-list 10 permit 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255 access-list 10 deny any line vty 0 4 access-group 10 in

B.

access-list 10 permit host 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255 access-list 10 deny any line vty 0 4 access-class 10 out

C.

access-list 10 permit host 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255 access-list 10 deny any line vty 0 4 access-class 10 in

D.

access-list 10 permit host 10.10.2.103 access-list 11 permit host 10.10.0.0 255.255.255.0 access-list 12 deny any line vty 0 4 access-group 10, 11, 12 in

Buy Now
Questions 18

Fill in the blank with the appropriate tool name.

______________ is a network protocol analyzer tool that is used to capture packet data from an existing network or examine packet data from a pre-saved file.

Options:

A.

Compound attack objects

B.

TShark

C.

Blowfish

D.

Wingate

Buy Now
Questions 19

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network.

What feature of a router would accomplish this?

Options:

A.

Firewall

B.

Port forwarding

C.

NAT

D.

MAC filtering

Buy Now
Questions 20

The simplest form of a firewall is a packet filtering firewall. Typically, a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets.

On which of the following layers of the Open System Interconnection (OSI) reference model do these routers filter information?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Transport layer

B.

Data Link layer

C.

Physical layer

D.

Network layer

Buy Now
Questions 21

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data.

Which of the following tools can he use to accomplish the task?

Options:

A.

Hunt

B.

Mendax

C.

Alchemy Remote Executor

D.

Ettercap

Buy Now
Questions 22

Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred.

Which of the following switches will she use with CHKDSK command to accomplish the task?

Options:

A.

CHKDSK /R /F

B.

CHKDSK /I

C.

CHKDSK /V /X

D.

CHKDSK /C /L

Buy Now
Questions 23

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.

Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:

A.

OpenSSH

B.

IPChains

C.

Stunnel

D.

IPTables

Buy Now
Questions 24

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it.

By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

21

B.

443

C.

80

D.

22

Buy Now
Questions 25

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server.

Which of the following tools will John use to accomplish his task?

Options:

A.

PsList

B.

Fpipe

C.

Cain

D.

PsExec

Buy Now
Questions 26

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices.

Which of the following protocols is used by VPN for tunneling?

Options:

A.

L2TP

B.

IPSec

C.

HTTPS

D.

SSL

Buy Now
Questions 27

Which of the following fields is 13 bits long and specifies the offset of a particular fragment relative to the beginning of the original un-fragmented IP datagram?

Options:

A.

Protocol

B.

Time to live

C.

Header checksum

D.

Fragment offset

Buy Now
Questions 28

Which of the following are the types of intrusion detection systems?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Network intrusion detection system (NIDS)

B.

Client-based intrusion detection system (CIDS)

C.

Host-based intrusion detection system (HIDS)

D.

Server-based intrusion detection system (SIDS)

Buy Now
Questions 29

Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

Tcpdump

B.

Ettercap

C.

Fragroute

D.

Mendax

Buy Now
Questions 30

Which of the following vulnerability scanners detects vulnerabilities by actually performing attacks?

Options:

A.

Port scanner

B.

Computer worm

C.

Network enumerator

D.

Web application security scanner

Buy Now
Questions 31

Jain works as a Security Manager for ABC Inc. The company has a Windows-based network.

Jain has been assigned a project to detect the services used by an attack to access the network. For this purpose, he is required to use the predefined service objects of the rulebase. This predefined service object defines the services used in the attack to access the network.

Which of the following objects will he create when he finds that the attack is not defined in the predefined service objects?

Options:

A.

Custom service objects

B.

Compound attack objects

C.

Signature attack objects

D.

Protocol anomaly attack objects

Buy Now
Questions 32

Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a remote location and a public IPv4 address, instead of public IPv6 address, has been assigned to the computer?

Options:

A.

6to4

B.

PortProxy

C.

Teredo

D.

ISATAP

Buy Now
Questions 33

Adam works on a Linux system. He is using Sendmail as the primary application to transmit emails. Linux uses Syslog to maintain logs of what has occurred on the system.

Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

Options:

A.

/log/var/mailog

B.

/log/var/logd

C.

/var/log/logmail

D.

/var/log/mailog

Buy Now
Questions 34

Which of the following is a Windows-based tool used for packet analysis?

Options:

A.

AirPcap

B.

WinPcap

C.

Tcpdump

D.

WinDump

Buy Now
Questions 35

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

• It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.

• It is commonly used for the following purposes:

a) War driving

b) Detecting unauthorized access points

c) Detecting causes of interference on a WLAN

d) WEP ICV error tracking

e) Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

Options:

A.

THC-Scan

B.

Kismet

C.

Absinthe

D.

NetStumbler

Buy Now
Questions 36

In which of the following locations can the Cisco IOS file reside?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

NVRAM

B.

TFTP server

C.

ROM

D.

Flash memory

Buy Now
Questions 37

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an immediate router advertisement, instead of waiting for the next scheduled advertisement?

Options:

A.

Neighbor Advertisement

B.

Neighbor Solicitation

C.

Router Solicitation

D.

Router Advertisement

Buy Now
Questions 38

Which of the following attacks are prevented from a mutual authentication solution?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Phishing

B.

Eavesdropping attack

C.

Man-in-the-middle attack

D.

Hijacking

Buy Now
Questions 39

Which of the following tools can be used for passive OS fingerprinting?

Options:

A.

nmap

B.

dig

C.

tcpdump

D.

ping

Buy Now
Questions 40

The general form of the Cisco IOS is a.b.c.de.

Which of the following indicates the major version number of the Cisco IOS?

Options:

A.

b

B.

a

C.

e

D.

d

Buy Now
Questions 41

In which of the following conditions is the SYN Protector rule base activated in passive mode?

Options:

A.

When the number of SYN packets per second is equal to 13,425 (default).

B.

When the number of SYN packets per second is greater than the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.

C.

Only when the number of SYN packets per second is equal to the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.

D.

When the number of SYN packets per second is smaller than the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.

Buy Now
Questions 42

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures? (Choose two.)

Options:

A.

Dsniff

B.

KisMAC

C.

Snort

D.

Kismet

Buy Now
Questions 43

As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com.

Which of the following nmap switches have you used to accomplish the task?

Options:

A.

nmap -sS

B.

nmap -sT

C.

nmap -vO

D.

nmap -sO

Buy Now
Questions 44

Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?

Options:

A.

tcpdump -F file_name

B.

tcpdump -D file_name

C.

tcpdump -A file_name

D.

tcpdump -X file_name

Buy Now
Questions 45

Suppose you are working as a Security Administrator at ABC Inc. The company has a switched network. You have configured tcpdump in the network which can only see traffic addressed to itself and broadcast traffic.

What will you do when you are required to see all traffic of the network?

Options:

A.

Connect the sniffer device to a Switched Port Analyzer (SPAN) port.

B.

Connect the sniffer device to a Remote Switched Port Analyzer (RSPAN) port.

C.

Configure Network Access Control (NAC).

D.

Configure VLAN Access Control List (VACL).

Buy Now
Questions 46

Which of the following information must the fragments carry for the destination host to reassemble them back to the original unfragmented state?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Offset field

B.

MF flag

C.

Length of the data

D.

IP identification number

E.

IP address

F.

MAC address

Buy Now
Questions 47

Address Resolution Protocol (ARP) spoofing, also known as ARP poisoning or ARP Poison Routing (APR), is a technique used to attack an Ethernet wired or wireless network. ARP spoofing may allow an attacker to sniff data frames on a local area network (LAN), modify the traffic, or stop the traffic altogether. The principle of ARP spoofing is to send fake ARP messages to an Ethernet LAN.

What steps can be used as a countermeasure of ARP spoofing?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Using smash guard utility.

B.

Using ARP Guard utility.

C.

Using static ARP entries on servers, workstation and routers.

D.

Using ARP watch utility.

E.

Using IDS Sensors to check continually for large amount of ARP traffic on local subnets.

Buy Now
Questions 48

You work as a technician for ABC Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones.

Which of the following commands will you use?

Options:

A.

ping -a

B.

ping -4

C.

ping -t

D.

ping -l

Buy Now
Questions 49

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WPA with Pre Shared Key

B.

WPA

C.

WPA with 802.1X authentication

D.

WEP

Buy Now
Questions 50

Which of the following can provide security against man-in-the-middle attack?

Options:

A.

Anti-virus programs

B.

Strong data encryption during travel

C.

Strong authentication method

D.

Firewall

Buy Now
Questions 51

Which of the following methods will allow data to be sent on the Internet in a secure format?

Options:

A.

Browsing

B.

Virtual Private Networks

C.

Serial Line Interface Protocol

D.

Point-to-Point Protocol

Buy Now
Questions 52

In which of the following steps of firewall log analysis process is aggregation for nodes defined?

Options:

A.

Assess available data

B.

Visual transformation

C.

View transformation

D.

Process information

Buy Now
Questions 53

Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?

Options:

A.

MAK ID

B.

IP address

C.

IP identification number

D.

SSID

Buy Now
Questions 54

Which of the following is an attack with IP fragments that cannot be reassembled?

Options:

A.

Password guessing attack

B.

Smurf attack

C.

Teardrop attack

D.

Dictionary attack

Buy Now
Questions 55

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The network is configured on IP version 6 protocol. All the computers on the network are connected to a switch device. One day, users complain that they are unable to connect to a file server. You try to ping the client computers from the server, but the pinging fails. You try to ping the server's own loopback address, but it fails to ping. You restart the server, but the problem persists.

What is the most likely cause?

Options:

A.

The server's NIC is not working.

B.

Automatic IP addressing is not working.

C.

The server is configured with unspecified IP address.

D.

The cable that connects the server to the switch is broken.

E.

The switch device is not working.

Buy Now
Questions 56

Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?

Options:

A.

Snort

B.

NetStumbler

C.

AiroPeek

D.

Cain

Buy Now
Questions 57

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Buy Now
Questions 58

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.

Stateful firewall

B.

Proxy-based firewall

C.

Endian firewall

D.

Packet filter firewall

Buy Now
Questions 59

You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline.

This type of IDS is called __________.

Options:

A.

Signature Based

B.

Reactive IDS

C.

Anomaly Based

D.

Passive IDS

Buy Now
Questions 60

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

Options:

A.

Signature-based IDS

B.

Passive IDS

C.

Network-based IDS

D.

Active IDS

Buy Now
Questions 61

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks.

Which of the following measures will you take over the site network devices of the network?

Options:

A.

Disable the SSID broadcast feature of the router.

B.

Apply firewalls at appropriate spots.

C.

Download and install new firmware patch for the router.

D.

Apply a standard ACL on the router.

Buy Now
Questions 62

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.

Which of the following tools can you use to accomplish the task?

Options:

A.

P0f

B.

Superscan

C.

Nmap

D.

NBTscan

Buy Now
Questions 63

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

Options:

A.

Sniffer

B.

Dsniff

C.

Snort

D.

Nikto

Buy Now
Questions 64

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past.

Which of the following statements are true about external threats?

Each correct answer represents a complete solution. (Choose three.)

Options:

A.

These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Internet.

B.

These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized access.

C.

These are the threats that originate from within the organization.

D.

These are the threats intended to flood a network with large volumes of access requests.

Buy Now
Questions 65

Which of the following responsibilities does not come under the audit process?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Reviewing the results of the audit procedures.

B.

Reporting all facts and circumstances of the irregular and illegal acts.

C.

Planning the IT audit engagement based on the assessed level of risk.

D.

Applying security policies.

Buy Now
Questions 66

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

True positive

B.

False negative

C.

False positive

D.

True negative

Buy Now
Questions 67

You work as a Network Architect for Tech Perfect Inc. The company has a corporate LAN network. You will have to perform the following tasks:

• Limit events that occur from security threats such as viruses, worms, and spyware.

• Restrict access to the network based on identity or security posture.

Which of the following services will you deploy in the network to accomplish the tasks?

Options:

A.

Protocol-Independent Multicast

B.

Firewall Service Module

C.

Network Admission Control

D.

NetFlow

Buy Now
Questions 68

Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.

Which of the following attacks has been occurred on the wireless network of Adam?

Options:

A.

ARP spoofing

B.

NAT spoofing

C.

MAC spoofing

D.

DNS cache poisoning

Buy Now
Questions 69

Sam works as a Security Manager for ABC Inc. The company has a Windows-based network. Sam wants to prevent specific traffic from IDP processing in order to reduce false positives.

Which of the following rulebases will he use to accomplish the task?

Options:

A.

Network Honeypot rulebase

B.

Backdoor rulebase

C.

SYN Protector rulebase

D.

Exempt rulebase

Buy Now
Questions 70

Which of the following can be used in an extended access list to filter traffic?

Each correct answer represents a part of the solution. (Choose all that apply.)

Options:

A.

Source IP address

B.

Protocol

C.

Destination IP address

D.

TCP or UDP port number

E.

Destination MAC address

Buy Now
Questions 71

Which of the following is used to provide hook handling facility within the Linux kernel in order to capture and manipulate network packets?

Options:

A.

WinPcap

B.

WinDump

C.

Tcpdump

D.

Netfilter

Buy Now
Questions 72

Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

Options:

A.

Apache

B.

Snort

C.

SSH

D.

SUDO

Buy Now
Questions 73

Which of the following types of IP actions are supported by an IDP rulebase? (Choose three.)

Options:

A.

Initiate rules of the rulebase

B.

Notify

C.

Drop/block session

D.

Close connection

Buy Now
Questions 74

Which of the following fields is NOT included in packet fragmentation?

Options:

A.

Identification

B.

Flag

C.

Time to Live

D.

Fragment Offset

Buy Now
Questions 75

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone.

Which of the following commands will you use to accomplish the task?

Options:

A.

Dnscmd /config /enableglobalnames 1

B.

Dnscmd /config /globalnamesqueryorder 0

C.

Dnscmd /config /enableglobalnamessupport 1

D.

Dnscmd /config /enableglobalnamessupport 0

Buy Now
Questions 76

Which of the following proxy servers is also referred to as transparent proxies or forced proxies?

Options:

A.

Intercepting proxy server

B.

Anonymous proxy server

C.

Reverse proxy server

D.

Tunneling proxy server

Buy Now
Questions 77

Which of the following steps is involved in the network planning process?

Options:

A.

Documentation and analysis of results

B.

Data acquisition

C.

Analysis/Forecasting

D.

Network-synthesis

Buy Now
Questions 78

Paul works as a Technical Representative in a CSIRT for ABC Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Paul wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis.

Which of the following is the correct order for searching data on a Windows based system?

Options:

A.

Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system.

B.

Volatile data, file slack, registry, memory dumps, file system, system state backup, internet traces.

C.

Volatile data, file slack, file system, registry, memory dumps, system state backup, internet traces.

D.

Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps.

Buy Now
Questions 79

Which of the following devices works as a transparent bridge between the wireless clients and the wired network?

Options:

A.

Hub

B.

Access point

C.

Switch

D.

Wireless router

Buy Now
Questions 80

Which of the following number ranges is used for the IP Standard ACL?

Options:

A.

100-199

B.

1-99

C.

600-699

D.

1000-1099

Buy Now
Questions 81

Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network. Andrew is therefore assigned the task to recover the deleted mails.

Which of the following tools can Andrew use to accomplish the task?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

FINALeMAIL

B.

EventCombMT

C.

R-mail

D.

eMailTrackerPro

Buy Now
Questions 82

Jain works as a contract Ethical Hacker. He has recently got a project to do security checking for www.abc.com. He wants to find out the operating system of the ABC server in the information gathering step.

Which of the following commands will he use to accomplish the task?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

nc -v -n 208.100.2.25 80

B.

nmap -v -O www.abc.com

C.

nmap -v -O 208.100.2.25

D.

nc 208.100.2.25 23

Buy Now
Questions 83

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

It is a Unix-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Chipertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.

Which of the following tools is John using to crack the wireless encryption keys?

Options:

A.

Kismet

B.

AirSnort

C.

PsPasswd

D.

Cain

Buy Now
Questions 84

You work as a Network Administrator for ABC Inc.

The company's network contains five Windows 2003 servers and ninety Windows XP Professional client computers. You want to view all the incoming requests to an Internet Information Services (IIS) server and allow only requests that comply with a rule set, created by you, to be processed. You also want to detect the intrusion attempts by recognizing the strange characters in a URL on a Web server.

What will you do to accomplish the task?

Options:

A.

Configure a connection to the SQL database by using the RELOG command-line utility.

B.

Use the Remote Desktop Protocol (RDP).

C.

Use the HFNETCHK utility.

D.

Use the URL Scan tool.

Buy Now
Questions 85

What are the advantages of stateless autoconfiguration in IPv6?

Each correct answer represents a part of the solution. (Choose three.)

Options:

A.

Ease of use.

B.

It provides basic authentication to determine which systems can receive configuration data.

C.

No host configuration is necessary.

D.

No server is needed for stateless autoconfiguration.

Buy Now
Exam Code: GPPA
Exam Name: GIAC Certified Perimeter Protection Analyst
Last Update: Sep 15, 2025
Questions: 285
$66  $164.99
$50  $124.99
$42  $104.99
buy now GPPA