Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GPPA Practice Exam with Questions & Answers | Set: 9

Questions 81

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:
A.

Stateful firewall

B.

Proxy-based firewall

C.

Endian firewall

D.

Packet filter firewall

GIAC GPPA Premium Access
Questions 82

You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world.

What tool would you use to accomplish this?

Options:
A.

Packet sniffer

B.

Network mapper

C.

Protocol analyzer

D.

A port scanner

Questions 83

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data.

Which of the following tools can he use to accomplish the task?

Options:
A.

Hunt

B.

Mendax

C.

Alchemy Remote Executor

D.

Ettercap

Questions 84

Which of the following is used to provide hook handling facility within the Linux kernel in order to capture and manipulate network packets?

Options:
A.

WinPcap

B.

WinDump

C.

Tcpdump

D.

Netfilter

Questions 85

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it.

By default, which of the following standard ports does the SSH protocol use for connection?

Options:
A.

21

B.

443

C.

80

D.

22