Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPPA Practice Exam with Questions & Answers | Set: 3

Questions 21

You work as a Network Administrator for NetTech Inc. You want to prevent your network from Ping flood attacks.

Which of the following protocols will you block to accomplish this task?

Options:
A.

IP

B.

FTP

C.

PPP

D.

ICMP

GIAC GPPA Premium Access
Questions 22

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively.

Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:
A.

Mac OS

B.

Windows XP

C.

MINIX 3

D.

Linux

Questions 23

Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com.

He has successfully completed the following steps of the preattack phase:

>> Information gathering

>> Determining network range

>> Identifying active machines

>> Finding open ports and applications

>> OS fingerprinting

>> Fingerprinting services

Now Jain wants to perform network mapping of the ABC network.

Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:
A.

Traceroute

B.

Cheops

C.

NeoTrace

D.

Ettercap

Questions 24

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint.

Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?

Options:
A.

nmap -O -p

B.

nmap -sS

C.

nmap -sU -p

D.

nmap -sT

Questions 25

Which of the following statements about Access control list (ACL) are true?

Each correct answer represents a complete solution. (Choose three.)

Options:
A.

Extended IP Access Control List permits or denies traffic from a specific source IP addresses or for a specific destination IP address, and port.

B.

Standard IP Access Control List permits or denies packets only from specific source IP addresses.

C.

Access control list filters packets or network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces.

D.

Extended IP Access Control List permits or denies packets only from a specific source IP addresses.

E.

Standard IP Access Control List can be used to permit or deny traffic from a specific source IP addresses or for a specific destination IP address, and port.

Questions 26

In which of the following CAATs (Computer Assisted Auditing Techniques) does an auditor perform tests on computer files and databases?

Options:
A.

Parallel Simulation

B.

Custom Audit Software (CAS)

C.

Generalized Audit Software (GAS)

D.

Test Data

Questions 27

Which of the following files is a Cisco IOS configuration file that resides in RAM?

Options:
A.

temp-config

B.

running-config

C.

startup-config

D.

ram-config

Questions 28

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo.

Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:
A.

Temporary Internet Folder

B.

History folder

C.

Download folder

D.

Cookies folder

Questions 29

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

It is a Unix-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Chipertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.

Which of the following tools is John using to crack the wireless encryption keys?

Options:
A.

Kismet

B.

AirSnort

C.

PsPasswd

D.

Cain

Questions 30

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.

Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:
A.

OpenSSH

B.

IPChains

C.

Stunnel

D.

IPTables