Certbus > GIAC > GIAC Certifications > GPPA > GPPA Online Practice Questions and Answers

GPPA Online Practice Questions and Answers

Questions 4

Which of the following protocols is used by TFTP as a file transfer protocol?

A. SMTP

B. UDP

C. TCP

D. SNMP

Browse 285 Q&As
Questions 5

Which of the following is a version of netcat with integrated transport encryption capabilities?

A. Encat

B. Nikto

C. Socat

D. Cryptcat

Browse 285 Q&As
Questions 6

Which of the following well-known ports is used by BOOTP?

A. UDP 67

B. TCP 21

C. UDP 69

D. TCP 161

Browse 285 Q&As
Questions 7

Which of the following commands configures a router to encrypt all passwords entered after the command has been executed, as well as all passwords already on the running configuration?

A. no service password-encryption

B. service password-encryption

C. enable password-encryption

D. no enable password-encryption

Browse 285 Q&As
Questions 8

Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers.

Which of the following programs can Mark use to fulfill this requirement?

A. Wingate

B. Microsoft Internet Security and Acceleration Server (ISA)

C. Sniffer

D. SOCKS

Browse 285 Q&As
Questions 9

Passive OS fingerprinting (POSFP) is configured in an organization's network in order to improve the alert

output by reporting some information.

Which of the following information does it include?

Each correct answer represents a part of the solution. (Choose all that apply.)

A. Network security device

B. Source of the OS identification

C. Victim OS

D. Relevancy to the victim in the alert

Browse 285 Q&As
Questions 10

Which of the following libraries does TShark use to capture traffic from the first available network interface?

A. bcap

B. dcap

C. scap

D. pcap

Browse 285 Q&As
Questions 11

Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel

between two networked devices.

Which of the following features are supported by Secure Shell?

Each correct answer represents a complete solution. (Choose all that apply.)

A. SSH uses the client-server model.

B. SSH can transfer files using the associated HTTP or FTP protocols.

C. SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections.

D. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.

Browse 285 Q&As
Questions 12

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process.

Which of the following actions will you take for this?

A. Install a host-based IDS

B. Enable verbose logging on the firewall

C. Install a DMZ firewall

D. Install a network-based IDS

Browse 285 Q&As
Questions 13

Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?

A. IPS

B. NIDS

C. HIDS

D. DMZ

Browse 285 Q&As
Questions 14

Which of the following is an attack with IP fragments that cannot be reassembled?

A. Password guessing attack

B. Smurf attack

C. Teardrop attack

D. Dictionary attack

Browse 285 Q&As
Questions 15

You are configuring a public access wireless connection.

Which of the following is the best way to secure this connection?

A. Not broadcasting SSID

B. Implementing anti-virus

C. Using MAC filtering

D. Using WPA encryption

Browse 285 Q&As
Questions 16

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. A firewall has been configured on the network. You configure a filter on the router. You verify that SMTP operations have stopped after the recent configuration.

Which of the following ports will you have to open on the router to resolve the issue?

A. 20

B. 21

C. 80

D. 25

Browse 285 Q&As
Questions 17

Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

A. Dynamic NAT

B. Static NAT

C. Cache NAT

D. Port Address Translation (PAT)

Browse 285 Q&As
Questions 18

As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com. Which of the following nmap switches have you used to accomplish the task?

A. nmap -sS

B. nmap -sT

C. nmap -vO

D. nmap -sO

Browse 285 Q&As
Exam Code: GPPA
Exam Name: GIAC Certified Perimeter Protection Analyst (GPPA)
Last Update: Mar 18, 2025
Questions: 285 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99