Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPPA Practice Exam with Questions & Answers | Set: 5

Questions 41

You work as a System Administrator for ABC Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. Your network is configured for IPv6 IP addressing.

Which of the following commands will you use to test TCP/IP connectivity?

Options:
A.

ping

B.

ping6

C.

traceroute

D.

ifconfig

GIAC GPPA Premium Access
Questions 42

Sam works as a Network Administrator for Gentech Inc. He has been assigned a project to develop the rules that define the IDP policy in the rulebase.

Which of the following will he define as the components of the IDP policy rule?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:
A.

IDP Profiler

B.

IDP rule notifications

C.

IDP rule IP actions

D.

IDP appliance deployment mode

Questions 43

You work as a Security Manager for Tech Perfect Inc. The company has a Windows-based network. You want to scroll real-time network traffic to a command console in a readable format.

Which of the following command line utilities will you use to accomplish the task?

Options:
A.

WinDump

B.

libpcap

C.

WinPcap

D.

iptables

Questions 44

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?

Options:
A.

HTTP

B.

UDP

C.

SSL

D.

IPSec

Questions 45

You work as a Network Security Administrator for NetPerfect Inc. The company has a Windowsbased network. You are in charge of the data and network security of the company. While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential data.

What type of threat is this?

Options:
A.

Zombie

B.

External threat

C.

Malware

D.

Internal threat

Questions 46

A company named Tech Perfect Inc. has a TCP/IP based network. An IPS sensor is deployed in the network and configured to operate in promiscuous mode. IP blocking functionality works there in order to stop traffic from an attacking host and it helps in analyzing what happens in the network. The management wants to initiate a persistent connection with the managed devices until the block is removed.

Which of the following will you configure in the network to accomplish the task?

Options:
A.

Access Control List

B.

Firewall

C.

Network Admission Control

D.

Virtual LAN

Questions 47

Which of the following commands in MQC tool matches IPv4 and IPv6 packets when IP parameter is missing?

Options:
A.

Match fr-dlci

B.

Match IP precedence

C.

Match access-group

D.

Match cos

Questions 48

Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a remote location and a public IPv4 address, instead of public IPv6 address, has been assigned to the computer?

Options:
A.

6to4

B.

PortProxy

C.

Teredo

D.

ISATAP

Questions 49

John works as a Network Administrator for Web Perfect Inc. The company has a wireless LAN network. John has configured shared key authentication on a client. The client and the AP start exchanging the frames to enable authentication.

Which of the following vulnerabilities may occur while the client and the AP exchange the challenge text over the wireless link?

Options:
A.

Land attack

B.

DoS attack

C.

Vulnerability attack

D.

Man-in-the-middle attack

Questions 50

Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. In order to do so, he performs the following steps of the preattack phase successfully:

• Information gathering

• Determination of network range

• Identification of active systems

• Location of open ports and applications 

Now, which of the following tasks should he perform next?

Options:
A.

Install a backdoor to log in remotely on the We-are-secure server.

B.

Map the network of We-are-secure Inc.

C.

Fingerprint the services running on the we-are-secure network.

D.

Perform OS fingerprinting on the We-are-secure network.