Pass the GIAC Cyber Security GPPA Questions and answers with CertsForce

Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions
Questions # 61:

Sam works as a Network Administrator for Gentech Inc. He has been assigned a project to develop the rules that define the IDP policy in the rulebase.

Which of the following will he define as the components of the IDP policy rule?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

IDP Profiler


B.

IDP rule notifications


C.

IDP rule IP actions


D.

IDP appliance deployment mode


Expert Solution
Questions # 62:

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.

Which of the following tools can you use to accomplish the task?

Options:

A.

P0f


B.

Superscan


C.

Nmap


D.

NBTscan


Expert Solution
Questions # 63:

Which of the following commands configures a router to encrypt all passwords entered after the command has been executed, as well as all passwords already on the running configuration?

Options:

A.

no service password-encryption


B.

service password-encryption


C.

enable password-encryption


D.

no enable password-encryption


Expert Solution
Questions # 64:

Which of the following fields is NOT included in packet fragmentation?

Options:

A.

Identification


B.

Flag


C.

Time to Live


D.

Fragment Offset


Expert Solution
Questions # 65:

You work as a System Administrator for ABC Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. Your network is configured for IPv6 IP addressing.

Which of the following commands will you use to test TCP/IP connectivity?

Options:

A.

ping


B.

ping6


C.

traceroute


D.

ifconfig


Expert Solution
Questions # 66:

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?

Options:

A.

HTTP


B.

UDP


C.

SSL


D.

IPSec


Expert Solution
Questions # 67:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server.

Which of the following tools will John use to accomplish his task?

Options:

A.

PsList


B.

Fpipe


C.

Cain


D.

PsExec


Expert Solution
Questions # 68:

Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-to-peer attacks when the laptops are used in public access network? (Choose two.)

Options:

A.

Use protocol analyzer


B.

Use security protocols


C.

Use firewall


D.

Use Port Address Translation


Expert Solution
Questions # 69:

You work as a Firewall Analyst in the ABC Inc. The company has a Linux-based environment. You have installed and configured netfilter/iptables on all computer systems.

What are the main features of netfilter/iptables?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

It provides network address and port address translations with both IPv4 and IPv6 addressing schemes.


B.

It offers stateless and stateful packet filtering with both IPv4 and IPv6 addressing schemes.


C.

It includes a number of layers of API's for third party extensions.


D.

It includes many plug-ins or modules in 'patch-o-matic' repository.


Expert Solution
Questions # 70:

Which of the following can be used in an extended access list to filter traffic?

Each correct answer represents a part of the solution. (Choose all that apply.)

Options:

A.

Source IP address


B.

Protocol


C.

Destination IP address


D.

TCP or UDP port number


E.

Destination MAC address


Expert Solution
Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions