Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GPPA Exam Dumps - GIAC Cyber Security Questions and Answers

Question # 14

David works as the Security Manager for ABC Inc. He has been assigned a project to detect the attacks over multiple connections and sessions and to count the number of scanned ports in a defined time period.

Which of the following rulebases will he use to accomplish the task?

Options:

A.

SYN Protector rulebase

B.

Exempt rulebase

C.

Traffic Anomalies rulebase

D.

Network Honeyport rulebase

Buy Now
Question # 15

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

Options:

A.

Signature-based IDS

B.

Passive IDS

C.

Network-based IDS

D.

Active IDS

Buy Now
Question # 16

You want to create a binary log file using tcpdump.

Which of the following commands will you use?

Options:

A.

tcpdump -d

B.

tcpdump -B

C.

tcpdump -dd

D.

tcpdump -w

Buy Now
Question # 17

Which of the following command-line utilities is used to show the state of current TCP/IP connections?

Options:

A.

NETSTAT

B.

TRACERT

C.

NSLOOKUP

D.

PING

Buy Now
Question # 18

Which of the following statements about Access control list (ACL) are true?

Each correct answer represents a complete solution. (Choose three.)

Options:

A.

Extended IP Access Control List permits or denies traffic from a specific source IP addresses or for a specific destination IP address, and port.

B.

Standard IP Access Control List permits or denies packets only from specific source IP addresses.

C.

Access control list filters packets or network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces.

D.

Extended IP Access Control List permits or denies packets only from a specific source IP addresses.

E.

Standard IP Access Control List can be used to permit or deny traffic from a specific source IP addresses or for a specific destination IP address, and port.

Buy Now
Question # 19

In which of the following locations can the Cisco IOS file reside?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

NVRAM

B.

TFTP server

C.

ROM

D.

Flash memory

Buy Now
Question # 20

In which of the following steps of firewall log analysis process is aggregation for nodes defined?

Options:

A.

Assess available data

B.

Visual transformation

C.

View transformation

D.

Process information

Buy Now
Question # 21

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter?

Options:

A.

Stateless packet filter firewall

B.

Virtual firewall

C.

PIX firewall

D.

Stateful packet filter firewall

Buy Now
Question # 22

On which of the following interfaces of the router is the clock rate command used?

Options:

A.

DCE

B.

ETHERNET

C.

DTE

D.

VIRTUAL LINE VTY

Buy Now
Question # 23

You work as a Network Administrator at ABC Inc. You want to implement a solution that will automatically disallow connections if an attack is suspected.

Which of the following technologies will you choose to accomplish the task?

Options:

A.

ACL

B.

SRTP

C.

IPS

D.

IIS

Buy Now
Exam Code: GPPA
Exam Name: GIAC Certified Perimeter Protection Analyst
Last Update: Aug 24, 2025
Questions: 285
GPPA pdf

GPPA PDF

$25.5  $84.99
GPPA Engine

GPPA Testing Engine

$28.5  $94.99
GPPA PDF + Engine

GPPA PDF + Testing Engine

$40.5  $134.99