Pass the GIAC Cyber Security GPPA Questions and answers with CertsForce

Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following has a set of system-independent functions for packet capture and network analysis?

Options:

A.

WinDump


B.

WinPcap


C.

libpcap


D.

tcpdump


Questions # 2:

Which of the following types of vulnerability scanners performs a black-box test?

Options:

A.

Port scanner


B.

Web application security scanner


C.

CGI scanner


D.

Network scanner


Questions # 3:

Which of the following commands is recommended by Cisco for latest switches and routers to erase the contents of NVRAM?

Options:

A.

reload


B.

erase startup-config


C.

erase nvram:


D.

write erase


Questions # 4:

Which of the following components are used in the implementation of a wireless intrusion prevention system?

Each correct answer represents a part of the solution. (Choose three.)

Options:

A.

Sensor


B.

Console


C.

Analyzer


D.

Server


Questions # 5:

Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool.

Which of the following tools is Adam using?

Options:

A.

HxD


B.

Vedit


C.

WinHex


D.

Evidor


Questions # 6:

In which of the following locations can the Cisco IOS file reside?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

NVRAM


B.

TFTP server


C.

ROM


D.

Flash memory


Questions # 7:

You work as a Network Administrator for NetTech Inc. Your manager needs to access a particular server on the network from outside the company network. You have a registered IP address assigned to a router on the company network.

Which of the following will be useful for accessing the server from outside the network?

Options:

A.

Overloading


B.

Switch


C.

Static NAT


D.

Dynamic VLAN


Questions # 8:

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Pattern matching detection


B.

Protocol detection


C.

Knowledge-based detection


D.

Statistical anomaly detection


Questions # 9:

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP


B.

IPSec


C.

FTP


D.

IPX/SPX


Questions # 10:

In which of the following conditions is the SYN Protector rule base activated in passive mode?

Options:

A.

When the number of SYN packets per second is equal to 13,425 (default).


B.

When the number of SYN packets per second is greater than the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.


C.

Only when the number of SYN packets per second is equal to the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.


D.

When the number of SYN packets per second is smaller than the sum of the lower SYNs-per-second threshold and the upper SYNs-per-second threshold.


Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions