Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GPPA Exam Dumps - GIAC Cyber Security Questions and Answers

Question # 24

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?

Options:

A.

Dsniff

B.

Kismet

C.

KisMAC

D.

Snort

Buy Now
Question # 25

Which of the following can be used in an extended access list to filter traffic?

Each correct answer represents a part of the solution. (Choose all that apply.)

Options:

A.

Source IP address

B.

Protocol

C.

Destination IP address

D.

TCP or UDP port number

E.

Destination MAC address

Buy Now
Question # 26

John works as a Network Administrator for Web Perfect Inc. The company has a wireless LAN network. John has configured shared key authentication on a client. The client and the AP start exchanging the frames to enable authentication.

Which of the following vulnerabilities may occur while the client and the AP exchange the challenge text over the wireless link?

Options:

A.

Land attack

B.

DoS attack

C.

Vulnerability attack

D.

Man-in-the-middle attack

Buy Now
Question # 27

Which of the following is a version of netcat with integrated transport encryption capabilities?

Options:

A.

Encat

B.

Nikto

C.

Socat

D.

Cryptcat

Buy Now
Question # 28

You are tasked with configuring your routers with a minimum security standard that includes the following:

• A local Username and Password configured on the router

• A strong privilege mode password

• Encryption of user passwords

• Configuring telnet and ssh to authenticate against the router user database

Choose the configuration that meets these requirements best.

Options:

A.

RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable password n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login local

B.

RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login

C.

RouterA(config)#service enable-password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login user

D.

RouterA(config)#service password-encryption RouterA(config)#username cisco password PaS$w0Rd RouterA(config)#enable secret n56e&$te RouterA(config)#line vty 0 4 RouterA(config-line)#login local

Buy Now
Question # 29

Which of the following IPv4 fields become obsolete while removing the hop-by-hop segmentation (fragmentation) procedure from the IP header?

Each correct answer represents a part of the solution. (Choose three.)

Options:

A.

Datagram Identification Number field

B.

Flags field

C.

Fragment Offset field

D.

Datagram Length field

Buy Now
Question # 30

Which of the following statements are true about the Network Honeypot a rulebase?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Its operation setting toggles between the network honeypot on and off.

B.

Its rules are triggered when a source IP address sends a connection request to the destination IP address and service specified in the rule.

C.

It does not support any IP action.

D.

It is used to detect reconnoitering activities.

Buy Now
Question # 31

Which of the following files is a Cisco IOS configuration file that resides in RAM?

Options:

A.

temp-config

B.

running-config

C.

startup-config

D.

ram-config

Buy Now
Question # 32

Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack.

What can he do to accomplish this?

Options:

A.

Use an SSL certificate.

B.

Use a proxy server.

C.

Use EFS.

D.

Use a firewall.

Buy Now
Question # 33

Which of the following information must the fragments carry for the destination host to reassemble them back to the original unfragmented state?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Offset field

B.

MF flag

C.

Length of the data

D.

IP identification number

E.

IP address

F.

MAC address

Buy Now
Exam Code: GPPA
Exam Name: GIAC Certified Perimeter Protection Analyst
Last Update: Aug 24, 2025
Questions: 285
GPPA pdf

GPPA PDF

$25.5  $84.99
GPPA Engine

GPPA Testing Engine

$28.5  $94.99
GPPA PDF + Engine

GPPA PDF + Testing Engine

$40.5  $134.99