Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GPPA Exam Dumps - GIAC Cyber Security Questions and Answers

Question # 34

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be most helpful against Denial of Service (DOS) attacks?

Options:

A.

Honey pot

B.

Network surveys

C.

Stateful Packet Inspection (SPI) firewall

D.

Packet filtering firewall

Buy Now
Question # 35

Which of the following modes is also referred to as client mode?

Options:

A.

Ad-hoc mode

B.

Manage mode

C.

Monitor mode

D.

Master mode

Buy Now
Question # 36

Which of the following are the types of intrusion detection systems?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Network intrusion detection system (NIDS)

B.

Client-based intrusion detection system (CIDS)

C.

Host-based intrusion detection system (HIDS)

D.

Server-based intrusion detection system (SIDS)

Buy Now
Question # 37

Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?

Options:

A.

2

B.

0

C.

1

D.

F

Buy Now
Question # 38

Adam works on a Linux system. He is using Sendmail as the primary application to transmit emails. Linux uses Syslog to maintain logs of what has occurred on the system.

Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

Options:

A.

/log/var/mailog

B.

/log/var/logd

C.

/var/log/logmail

D.

/var/log/mailog

Buy Now
Question # 39

Jain works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.abc.com.

He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the ABC server.

To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus.

Which of the following IDS evasion attacks is John performing?

Options:

A.

Evasion attack

B.

Polymorphic shell code attack

C.

Insertion attack

D.

Session splicing attack

Buy Now
Question # 40

Which of the following is known as DNS spoofing?

Options:

A.

Malicious cache poisoning

B.

Trojan horse

C.

Smurf attack

D.

Social engineering

Buy Now
Question # 41

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?

Options:

A.

LogIDS 1.0

B.

WIDS

C.

Snort 2.1.0

D.

NFR security

Buy Now
Question # 42

Which of the following devices are used to implement Network Address Translation (NAT)?

Options:

A.

Routers and switches

B.

Routers and firewalls

C.

Firewalls and file servers

D.

Switches and firewalls

Buy Now
Question # 43

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server.

Which of the following tools will John use to accomplish his task?

Options:

A.

PsList

B.

Fpipe

C.

Cain

D.

PsExec

Buy Now
Exam Code: GPPA
Exam Name: GIAC Certified Perimeter Protection Analyst
Last Update: Aug 24, 2025
Questions: 285
GPPA pdf

GPPA PDF

$25.5  $84.99
GPPA Engine

GPPA Testing Engine

$28.5  $94.99
GPPA PDF + Engine

GPPA PDF + Testing Engine

$40.5  $134.99