Pass the GIAC Cyber Security GPPA Questions and answers with CertsForce

Viewing page 3 out of 9 pages
Viewing questions 21-30 out of questions
Questions # 21:

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP network. You have been assigned a task to configure security mechanisms for the network of the company. You have decided to configure a packet filtering firewall.

Which of the following may be the reasons that made you choose a packet filtering firewall as a security mechanism?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

It is easy to install packet filtering firewalls in comparison to the other network security solutions.


B.

It makes security transparent to end-users which provide easy use of the client applications.


C.

It prevents application-layer attacks.


D.

It easily matches most of the fields in Layer 3 packets and Layer 4 segment headers, and thus, provides a lot of flexibility in implementing security policies.


Expert Solution
Questions # 22:

Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

Options:

A.

Multicast


B.

Anycast


C.

Unicast


D.

Loopback


Expert Solution
Questions # 23:

John works as the Security Manager for PassGuide Inc. He wants to create the Profiler database that stores information about the network activity at Layer 3, Layer 4, and Layer 7.

Which of the following will he use to accomplish the task?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Protocol contexts


B.

Ignore connection


C.

Session creation


D.

Session teardown


Expert Solution
Questions # 24:

Which of the following is a Windows-based tool used for packet analysis?

Options:

A.

AirPcap


B.

WinPcap


C.

Tcpdump


D.

WinDump


Expert Solution
Questions # 25:

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?

Options:

A.

Dsniff


B.

Kismet


C.

KisMAC


D.

Snort


Expert Solution
Questions # 26:

Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

Options:

A.

Apache


B.

Snort


C.

SSH


D.

SUDO


Expert Solution
Questions # 27:

John works as a Security Manager for Gentech Inc. He uses an IDP engine to detect the type of interactive traffic produced during an attack in which the attacker wants to install the mechanism on a host system that facilitates the unauthorized access and breaks the system confidentiality.

Which of the following rulebases will he use to accomplish the task?

Options:

A.

Traffic Anomalies rulebase


B.

SYN Protector rulebase


C.

Backdoor rulebase


D.

Exempt rulebase


Expert Solution
Questions # 28:

At which of the following layers of the OSI reference model does a Proxy firewall, also known as Application Gateway Firewall, filter information?

Each correct answer represents a part of the solution. (Choose all that apply.)

Options:

A.

Transport layer


B.

Physical layer


C.

Application layer


D.

Presentation layer


Expert Solution
Questions # 29:

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

Options:

A.

Fragmentation overwrite attack


B.

Fragmentation overlap attack


C.

Evasion attack


D.

Insertion attack


Expert Solution
Questions # 30:

Jain works as a contract Ethical Hacker. He has recently got a project to do security checking for www.abc.com. He wants to find out the operating system of the ABC server in the information gathering step.

Which of the following commands will he use to accomplish the task?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

nc -v -n 208.100.2.25 80


B.

nmap -v -O www.abc.com


C.

nmap -v -O 208.100.2.25


D.

nc 208.100.2.25 23


Expert Solution
Viewing page 3 out of 9 pages
Viewing questions 21-30 out of questions