Pass the GIAC Cyber Security GPPA Questions and answers with CertsForce

Viewing page 2 out of 9 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address?

Options:

A.

Circuit-level gateway


B.

Application gateway


C.

Proxy server


D.

Packet Filtering


Expert Solution
Questions # 12:

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices.

Which of the following protocols is used by VPN for tunneling?

Options:

A.

L2TP


B.

IPSec


C.

HTTPS


D.

SSL


Expert Solution
Questions # 13:

Which of the following techniques is used to identify attacks originating from a botnet?

Options:

A.

Recipient filtering


B.

BPF-based filter


C.

IFilter


D.

Passive OS fingerprinting


Expert Solution
Questions # 14:

Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

Teardrop attack


B.

Land attack


C.

Ping of Death attack


D.

SYN flood attack


Expert Solution
Questions # 15:

The simplest form of a firewall is a packet filtering firewall. Typically, a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets.

On which of the following layers of the Open System Interconnection (OSI) reference model do these routers filter information?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Transport layer


B.

Data Link layer


C.

Physical layer


D.

Network layer


Expert Solution
Questions # 16:

Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel between two networked devices.

Which of the following features are supported by Secure Shell?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

SSH uses the client-server model.


B.

SSH can transfer files using the associated HTTP or FTP protocols.


C.

SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections.


D.

SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.


Expert Solution
Questions # 17:

Fill in the blank with the appropriate tool name.

______________ is a network protocol analyzer tool that is used to capture packet data from an existing network or examine packet data from a pre-saved file.

Options:

A.

Compound attack objects


B.

TShark


C.

Blowfish


D.

Wingate


Expert Solution
Questions # 18:

You work as a Network Administrator for a bank. For securing the bank's network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network. After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed.

What type of response is the IDS giving?

Options:

A.

False Negative


B.

False Positive


C.

True Positive


D.

True Negative


Expert Solution
Questions # 19:

Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

Options:

A.

Snort


B.

NetWitness


C.

Wireshark


D.

Netresident


Expert Solution
Questions # 20:

Which of the following is a maintenance protocol that permits routers and host computers to swap basic control information when data is sent from one computer to another?

Options:

A.

IGMP


B.

BGP


C.

SNMP


D.

ICMP


Expert Solution
Viewing page 2 out of 9 pages
Viewing questions 11-20 out of questions