Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPPA Practice Exam with Questions & Answers | Set: 2

Questions 11

Jain works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.abc.com.

He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the ABC server.

To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus.

Which of the following IDS evasion attacks is John performing?

Options:
A.

Evasion attack

B.

Polymorphic shell code attack

C.

Insertion attack

D.

Session splicing attack

GIAC GPPA Premium Access
Questions 12

Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?

Options:
A.

tcpdump -F file_name

B.

tcpdump -D file_name

C.

tcpdump -A file_name

D.

tcpdump -X file_name

Questions 13

You work as a Security Administrator for ABC Inc. You have implemented and configured a web application security scanner in the company's network. It helps in the automated review of the web applications with the defined purpose of discovering security vulnerabilities. In order to perform this task, the web application security scanner examines a number of vulnerabilities.

What are these vulnerabilities?

Each correct answer represents a complete solution. (Choose three.)

Options:
A.

Input/Output validation

B.

Denials of service against the TCP/IP stack

C.

Server configuration mistakes/errors/version

D.

Specific application problems

Questions 14

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

Options:
A.

SysPCap

B.

libpcap

C.

WinPCap

D.

PCAP

Questions 15

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

Options:
A.

Host Intrusion Detection System (HIDS)

B.

Network Intrusion Detection System (NIDS)

C.

Man trap

D.

Biometric device

Questions 16

Which of the following is a Windows-based tool used for packet analysis?

Options:
A.

AirPcap

B.

WinPcap

C.

Tcpdump

D.

WinDump

Questions 17

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.

Which of the following tools can you use to accomplish the task?

Options:
A.

P0f

B.

Superscan

C.

Nmap

D.

NBTscan

Questions 18

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:
A.

nmap

B.

portsentry

C.

libnids

D.

scanlogd

Questions 19

Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.

Which of the following attacks has been occurred on the wireless network of Adam?

Options:
A.

ARP spoofing

B.

NAT spoofing

C.

MAC spoofing

D.

DNS cache poisoning

Questions 20

You work as a Network Architect for ABC Inc. The company has a TCP/IP based network. You have established a remote-access VPN network between mobile users and the company's network. You want to implement the following features in the remote-access VPN network:

>> Provide security for the web traffic.

>> Browser clients can support the VPN connection to a host.

Which of the following will you configure to implement the given features in the network?

Options:
A.

DACL

B.

SSL

C.

SSH

D.

IPsec