Pass the GIAC Cyber Security GPPA Questions and answers with CertsForce

Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions
Questions # 41:

The general form of the Cisco IOS is a.b.c.de.

Which of the following indicates the major version number of the Cisco IOS?

Options:

A.

b


B.

a


C.

e


D.

d


Expert Solution
Questions # 42:

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel.

Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

DES


B.

Blowfish


C.

RC4


D.

IDEA


Expert Solution
Questions # 43:

You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world.

What tool would you use to accomplish this?

Options:

A.

Packet sniffer


B.

Network mapper


C.

Protocol analyzer


D.

A port scanner


Expert Solution
Questions # 44:

When client data is encapsulated into an LWAPP header, the wireless LAN controller improves the coverage areas.

Which information does the wireless LAN controller check?

Each correct answer represents a part of the solution. (Choose two.)

Options:

A.

RSSI


B.

SNR


C.

WCS


D.

CCA


Expert Solution
Questions # 45:

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively.

Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:

A.

Mac OS


B.

Windows XP


C.

MINIX 3


D.

Linux


Expert Solution
Questions # 46:

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. A firewall has been configured on the network. You configure a filter on the router. You verify that SMTP operations have stopped after the recent configuration.

Which of the following ports will you have to open on the router to resolve the issue?

Options:

A.

20


B.

21


C.

80


D.

25


Expert Solution
Questions # 47:

Which of the following fields are specified when rules are created for the Network Honeypot rulebase?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

A destination/service match condition


B.

Detection settings


C.

Response options


D.

Operation mode


Expert Solution
Questions # 48:

You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based routed network. You have recently come to know about the Slammer worm, which attacked computers in 2003 and doubled the number of infected hosts every 9 seconds or so. Slammer infected 75000 hosts in the first 10 minutes of the attack. To mitigate such security threats, you want to configure security tools on the network.

Which of the following tools will you use?

Options:

A.

Intrusion Detection Systems


B.

Anti-x


C.

Intrusion Prevention Systems


D.

Firewall


Expert Solution
Questions # 49:

You work as a technician for ABC Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones.

Which of the following commands will you use?

Options:

A.

ping -a


B.

ping -4


C.

ping -t


D.

ping -l


Expert Solution
Questions # 50:

Which of the following describes the term inside global in NAT configuration?

Options:

A.

It is a local MAC address assigned to a host in a private network.


B.

It is the data that comes inside a local network from an external host.


C.

It is a local IP address assigned to a host in a private network.


D.

It is the registered (public) IP address that represents the inside hosts in private network to the outside network.


Expert Solution
Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions