Pass the GIAC Cyber Security GPPA Questions and answers with CertsForce

Viewing page 6 out of 9 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

Options:

A.

Smurf


B.

Social engineering


C.

Denial-of-Service


D.

Man-in-the-middle


Expert Solution
Questions # 52:

Which of the following steps is involved in the network planning process?

Options:

A.

Documentation and analysis of results


B.

Data acquisition


C.

Analysis/Forecasting


D.

Network-synthesis


Expert Solution
Questions # 53:

Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.

Which of the following protocols does the DCC use?

Options:

A.

TCP


B.

UDP


C.

TELNET


D.

ICMP


Expert Solution
Questions # 54:

Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?

Options:

A.

tcpdump -F file_name


B.

tcpdump -D file_name


C.

tcpdump -A file_name


D.

tcpdump -X file_name


Expert Solution
Questions # 55:

Which of the following types of Intrusion Detection Systems consists of an agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state?

Options:

A.

APIDS


B.

PIDS


C.

NIDS


D.

HIDS


Expert Solution
Questions # 56:

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?

Options:

A.

LogIDS 1.0


B.

WIDS


C.

Snort 2.1.0


D.

NFR security


Expert Solution
Questions # 57:

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command.

Which of the following commands will you use?

Options:

A.

ping -l


B.

ping -t


C.

ping -a


D.

ping -n


Expert Solution
Questions # 58:

Which of the following statements about a host-based intrusion prevention system (HIPS) are true?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

It cannot detect events scattered over the network.


B.

It can handle encrypted and unencrypted traffic equally.


C.

It can detect events scattered over the network.


D.

It is a technique that allows multiple computers to share one or more IP addresses.


Expert Solution
Questions # 59:

Sam works as a Security Manager for ABC Inc. He has been assigned a project to detect reconnoitering activities. For this purpose, he has deployed a system in the network that attracts the attention of an attacker.

Which of the following rulebases will he use to accomplish the task?

Options:

A.

Backdoor rulebase


B.

Network Honeypot rulebase


C.

Exempt rulebase


D.

SYN Protector rulebase


Expert Solution
Questions # 60:

Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?

Options:

A.

MAK ID


B.

IP address


C.

IP identification number


D.

SSID


Expert Solution
Viewing page 6 out of 9 pages
Viewing questions 51-60 out of questions