Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GPPA Exam Dumps - GIAC Cyber Security Questions and Answers

Question # 4

Which of the following features does the Nmap utility have?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

It uses operating system fingerprinting technology to identify the operating system running on a target system.

B.

It identifies services running on systems in a specified range of IP addresses using scanning and sweeping feature.

C.

It has a stealth approach to scanning and sweeping.

D.

It is a location where an organization can easily view the event of a disaster, such as fire, flood, terrorist threat, or other disruptive events.

Buy Now
Question # 5

You are configuring a public access wireless connection.

Which of the following is the best way to secure this connection?

Options:

A.

Not broadcasting SSID

B.

Implementing anti-virus

C.

Using MAC filtering

D.

Using WPA encryption

Buy Now
Question # 6

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

True positive

B.

False negative

C.

False positive

D.

True negative

Buy Now
Question # 7

Paul works as a Technical Representative in a CSIRT for ABC Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Paul wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis.

Which of the following is the correct order for searching data on a Windows based system?

Options:

A.

Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system.

B.

Volatile data, file slack, registry, memory dumps, file system, system state backup, internet traces.

C.

Volatile data, file slack, file system, registry, memory dumps, system state backup, internet traces.

D.

Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps.

Buy Now
Question # 8

Which of the following fields is NOT included in packet fragmentation?

Options:

A.

Identification

B.

Flag

C.

Time to Live

D.

Fragment Offset

Buy Now
Question # 9

You work as a System Administrator for ABC Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. Your network is configured for IPv6 IP addressing.

Which of the following commands will you use to test TCP/IP connectivity?

Options:

A.

ping

B.

ping6

C.

traceroute

D.

ifconfig

Buy Now
Question # 10

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.

Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

Options:

A.

Policy-based detection

B.

Honey pot detection

C.

Anomaly-based detection

D.

Signature-based detection

Buy Now
Question # 11

As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com.

Which of the following nmap switches have you used to accomplish the task?

Options:

A.

nmap -sS

B.

nmap -sT

C.

nmap -vO

D.

nmap -sO

Buy Now
Question # 12

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled.

Which of the following attacks is John performing?

Options:

A.

Replay attack

B.

ARP spoofing

C.

DoS attack

D.

Rainbow attack

Buy Now
Question # 13

You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted.

What tool would you use to accomplish this?

Options:

A.

Password cracker

B.

Performance Monitor

C.

Packet sniffer

D.

Vulnerability analyzer

Buy Now
Exam Code: GPPA
Exam Name: GIAC Certified Perimeter Protection Analyst
Last Update: Aug 24, 2025
Questions: 285
GPPA pdf

GPPA PDF

$25.5  $84.99
GPPA Engine

GPPA Testing Engine

$28.5  $94.99
GPPA PDF + Engine

GPPA PDF + Testing Engine

$40.5  $134.99