Pass the GIAC Cyber Security GPPA Questions and answers with CertsForce

Viewing page 4 out of 9 pages
Viewing questions 31-40 out of questions
Questions # 31:

A remote-access VPN offers secured and encrypted connections between mobile or remote users and their corporate network across public networks.

Which of the following does the remote access VPN use for offering these types of connections?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

TLS


B.

SSL


C.

SSH


D.

IPsec


Expert Solution
Questions # 32:

Choose the best explanation for the resulting error when entering the command below.

Options:

A.

The wildcard mask is not provided for the source and destination addresses.


B.

The command is attempting to create a standard access list with extended access list parameters.


C.

The ACL commands should be entered from the (config-router) configuration mode.


D.

The port number given does not correspond with the proper transport protocol.


Expert Solution
Questions # 33:

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small-sized packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack signatures of such attacks.

Which of the following tools can be used to perform session splicing attacks?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Y.A.T.


B.

Fragroute


C.

Whisker


D.

Nessus


Expert Solution
Questions # 34:

Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.

Which of the following attacks has been occurred on the wireless network of Adam?

Options:

A.

ARP spoofing


B.

NAT spoofing


C.

MAC spoofing


D.

DNS cache poisoning


Expert Solution
Questions # 35:

You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks.

Which of the following applications will you use to accomplish the task?

Options:

A.

Network enumerator


B.

Port scanner


C.

Web application security scanner


D.

Computer worm


Expert Solution
Questions # 36:

What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?

Options:

A.

Use the TRACERT command with the /pingname parameter.


B.

Ping the source host with its IP address.


C.

Ping the source host with its computer name.


D.

Check the IP statistics on the file server.


Expert Solution
Questions # 37:

Which of the following program loads IOS image into RAM?

Options:

A.

POST


B.

NVRAM


C.

Bootstrap


D.

TFTP


Expert Solution
Questions # 38:

Which of the following is the module of OpenSER?

Options:

A.

TShark


B.

Sipsak


C.

WireShark


D.

SipTrace


Expert Solution
Questions # 39:

Which of the following command-line utilities is used to show the state of current TCP/IP connections?

Options:

A.

NETSTAT


B.

TRACERT


C.

NSLOOKUP


D.

PING


Expert Solution
Questions # 40:

Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?

Options:

A.

Overclocking


B.

Dynamic NAT


C.

Overloading


D.

Static NAT


Expert Solution
Viewing page 4 out of 9 pages
Viewing questions 31-40 out of questions