Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPPA Practice Exam with Questions & Answers

Questions 1

Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?

Options:
A.

Overclocking

B.

Dynamic NAT

C.

Overloading

D.

Static NAT

GIAC GPPA Premium Access
Questions 2

Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?

Options:
A.

IPSec

B.

WPA

C.

WEP

D.

L2TP

Questions 3

Which of the following is a hardware/software platform that is designed to analyze, detect and report on security related events.

NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

Options:
A.

NIDS

B.

HIDS

C.

HIPS

D.

NIPS

Questions 4

Which of the following terms is used to represent IPv6 addresses?

Options:
A.

Colon-dot

B.

Dot notation

C.

Hexadecimal-dot notation

D.

Colon-hexadecimal

Questions 5

Which of the following components are used in the implementation of a wireless intrusion prevention system?

Each correct answer represents a part of the solution. (Choose three.)

Options:
A.

Sensor

B.

Console

C.

Analyzer

D.

Server

Questions 6

The promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it.

Which of the following tools works by placing the host system network card into the promiscuous mode?

Options:
A.

Sniffer

B.

THC-Scan

C.

NetStumbler

D.

Snort

Questions 7

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network.

What feature of a router would accomplish this?

Options:
A.

Firewall

B.

Port forwarding

C.

NAT

D.

MAC filtering

Questions 8

In which of the following attacks does an attacker change the MAC address on the sniffer to one that is the same in another system on the local subnet?

Options:
A.

MAC duplicating

B.

IP spoofing

C.

ARP spoofing

D.

MAC flooding

Questions 9

You are the Network Administrator for a college. Wireless access is widely used at the college. You want the most secure wireless connections you can have.

Which of the following would you use?

Options:
A.

WEP

B.

WPA2

C.

WPA

D.

WEP2

Questions 10

Which of the following program loads IOS image into RAM?

Options:
A.

POST

B.

NVRAM

C.

Bootstrap

D.

TFTP