Pass4itsure > GIAC > GIAC Certifications > GPPA > GPPA Online Practice Questions and Answers

GPPA Online Practice Questions and Answers

Questions 4

Which of the following techniques is used to identify attacks originating from a botnet?

A. Recipient filtering

B. BPF-based filter

C. IFilter

D. Passive OS fingerprinting

Buy Now
Questions 5

Which of the following parts of IP header is used to specify the correct place of the fragment in the original un-fragmented datagram?

A. Fragment offset

B. TTL

C. Source address

D. Fragment ID

Buy Now
Questions 6

Which of the following applications cannot proactively detect anomalies related to a computer?

A. NIDS

B. HIDS

C. Anti-virus scanner

D. Firewall installed on the computer

Buy Now
Questions 7

You work as a Network Administrator for ABC Inc. The company has a Windows Server 2008- based

network. You have created a test domain for testing IPv6 addressing.

Which of the following types of addresses are supported by IPv6?

Each correct answer represents a complete solution. (Choose all that apply.)

A. Broadcast

B. Multicast

C. Anycast

D. Unicast

Buy Now
Questions 8

Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel

between two networked devices.

Which of the following features are supported by Secure Shell?

Each correct answer represents a complete solution. (Choose all that apply.)

A. SSH uses the client-server model.

B. SSH can transfer files using the associated HTTP or FTP protocols.

C. SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections.

D. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.

Buy Now
Questions 9

Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?

A. MAK ID

B. IP address

C. IP identification number

D. SSID

Buy Now
Questions 10

Which of the following has a set of system-independent functions for packet capture and network analysis?

A. WinDump

B. WinPcap

C. libpcap

D. tcpdump

Buy Now
Questions 11

Which of the following statements about segmentation of a network using router is true? Each correct answer represents a complete solution. (Choose three.)

A. Broadcast will not be forwarded to other segment through the router.

B. Number of broadcast domains will be decreased.

C. Filtering can be done based on layer 3 information.

D. Segmenting of a network using router will increase latency.

Buy Now
Questions 12

Which of the following types of audit constructs a risk profile for existing and new projects?

A. Innovative comparison audit

B. Technological innovation process audit

C. Technological position audit

D. Client/Server, Telecommunications, Intranets, and Extranets audits

Buy Now
Questions 13

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.

You have configured an 802.11g Wireless LAN (WLAN) on your network.

Which of the following factors can deteriorate the performance and range of the WLAN?

Each correct answer represents a complete solution. (Choose all that apply.)

A. Fiberglass partitions

B. Cordless phones

C. Metal ceilings

D. Concrete walls

Buy Now
Exam Code: GPPA
Exam Name: GIAC Certified Perimeter Protection Analyst (GPPA)
Last Update: Jan 04, 2025
Questions: 285
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99