Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPPA Practice Exam with Questions & Answers | Set: 4

Questions 31

Which of the following firewalls filters the traffic based on the header of the datagram?

Options:
A.

Circuit-level firewall

B.

Application-level firewall

C.

Packet filtering firewall

D.

Stateful inspection firewall

GIAC GPPA Premium Access
Questions 32

Which of the following applications cannot proactively detect anomalies related to a computer?

Options:
A.

NIDS

B.

HIDS

C.

Anti-virus scanner

D.

Firewall installed on the computer

Questions 33

You work as a Network Administrator for ABC Inc. The company has a TCP/IP network. You have been assigned a task to configure a stateful packet filtering firewall to secure the network of the company. You are encountering some problems while configuring the stateful packet filtering firewall.

Which of the following can be the reasons for your problems?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:
A.

It contains additional overhead of maintaining a state table.

B.

It has limited logging capabilities.

C.

It has to open up a large range of ports to allow communication.

D.

It is complex to configure.

Questions 34

Which of the following fields are specified when rules are created for the Network Honeypot rulebase?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:
A.

A destination/service match condition

B.

Detection settings

C.

Response options

D.

Operation mode

Questions 35

In which of the following conditions is the SYN Protector rule base activated in passive mode?

Options:
A.

When the number of SYN packets per second is equal to 13,425 (default).

B.

When the number of SYN packets per second is greater than the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.

C.

Only when the number of SYN packets per second is equal to the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.

D.

When the number of SYN packets per second is smaller than the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.

Questions 36

Which of the following types of firewall ensures that the packets are part of the established session?

Options:
A.

Circuit-level firewall

B.

Switch-level firewall

C.

Application-level firewall

D.

Stateful inspection firewall

Questions 37

Which of the following protocols is used with a tunneling protocol to provide security?

Options:
A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Questions 38

Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

Options:
A.

Port scanning

B.

ARP spoofing

C.

Session hijacking

D.

Man-in-the-middle

Questions 39

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

Options:
A.

Smurf

B.

Social engineering

C.

Denial-of-Service

D.

Man-in-the-middle

Questions 40

Which of the following libraries does TShark use to capture traffic from the first available network interface?

Options:
A.

bcap

B.

dcap

C.

scap

D.

pcap