Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPPA Practice Exam with Questions & Answers | Set: 8

Questions 71

Which of the following is the default port for POP3?

Options:
A.

80

B.

25

C.

21

D.

110

GIAC GPPA Premium Access
Questions 72

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.

Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

Options:
A.

Policy-based detection

B.

Honey pot detection

C.

Anomaly-based detection

D.

Signature-based detection

Questions 73

At which of the following layers of the OSI reference model does a Proxy firewall, also known as Application Gateway Firewall, filter information?

Each correct answer represents a part of the solution. (Choose all that apply.)

Options:
A.

Transport layer

B.

Physical layer

C.

Application layer

D.

Presentation layer

Questions 74

Fill in the blank with the appropriate tool name.

__________ consists of flexible system architecture that provides a proper way for conducting industrial audits when it is required to identify unique positions of items.

Options:
A.

Network-based IDS

B.

Baseline audit

C.

Active IDS

D.

Honey pot detection

Questions 75

Which of the following are packet filtering tools for the Linux operating system?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:
A.

IPTables

B.

IPFilter

C.

Zone Alarm

D.

BlackICE

Questions 76

Which of the following IPv4 fields become obsolete while removing the hop-by-hop segmentation (fragmentation) procedure from the IP header?

Each correct answer represents a part of the solution. (Choose three.)

Options:
A.

Datagram Identification Number field

B.

Flags field

C.

Fragment Offset field

D.

Datagram Length field

Questions 77

Which of the following attacks sends false ICMP packets in an attempt to cripple a system using random fake Internet source addresses?

Options:
A.

Twinge attack

B.

SYN attack

C.

Replay attack

D.

Land attack

Questions 78

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:
A.

Intrusion detection system (IDS)

B.

Firewall

C.

Demilitarized zone (DMZ)

D.

Packet filtering

Questions 79

Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel between two networked devices.

Which of the following features are supported by Secure Shell?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:
A.

SSH uses the client-server model.

B.

SSH can transfer files using the associated HTTP or FTP protocols.

C.

SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections.

D.

SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.

Questions 80

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone.

Which of the following commands will you use to accomplish the task?

Options:
A.

Dnscmd /config /enableglobalnames 1

B.

Dnscmd /config /globalnamesqueryorder 0

C.

Dnscmd /config /enableglobalnamessupport 1

D.

Dnscmd /config /enableglobalnamessupport 0