Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPPA Practice Exam with Questions & Answers | Set: 6

Questions 51

Which of the following is a Cisco IOS management term described in the statement below?

"It is the fourth digit in the configuration register and contains a hexadecimal value. The bootstrap program uses its value to choose which operating system to load into RAM".

Options:
A.

Boot value

B.

Boot field

C.

Boot

D.

Boot check

GIAC GPPA Premium Access
Questions 52

Which of the following devices are used to implement Network Address Translation (NAT)?

Options:
A.

Routers and switches

B.

Routers and firewalls

C.

Firewalls and file servers

D.

Switches and firewalls

Questions 53

Which of the following actions can be taken as the countermeasures against the ARP spoofing attack?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:
A.

Placing static ARP entries on servers and routes

B.

Using Private VLANs

C.

Using 8 digit passwords for authentication

D.

Looking for large amount of ARP traffic on local subnets

Questions 54

Which of the following IPv4 to IPv6 transition methods uses encapsulation of IPv6 packets to traverse IPv4 networks?

Options:
A.

Translation

B.

Stack

C.

Tunneling

D.

Dual-stack

Questions 55

Which of the following ports cannot be used to access the router from a computer?

Options:
A.

Console port

B.

Vty

C.

Aux port

D.

Serial port

Questions 56

Passive OS fingerprinting (POSFP) is configured in an organization's network in order to improve the alert output by reporting some information.

Which of the following information does it include?

Each correct answer represents a part of the solution. (Choose all that apply.)

Options:
A.

Network security device

B.

Source of the OS identification

C.

Victim OS

D.

Relevancy to the victim in the alert

Questions 57

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:
A.

File-based

B.

Network-based

C.

Anomaly-based

D.

Signature-based

Questions 58

In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?

Options:
A.

Insertion

B.

Fragmentation overlap

C.

Fragmentation overwrite

D.

Session splicing

Questions 59

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

Options:
A.

Cipher Block Chaining (CBC) Mode

B.

Electronic Codebook (ECB) Mode

C.

Propagating Cipher Block Chaining (PCBC) Mode

D.

Cipher Feedback (CFB) Mode

Questions 60

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server.

Which of the following tools will John use to accomplish his task?

Options:
A.

PsList

B.

Fpipe

C.

Cain

D.

PsExec