Pass the GIAC Cyber Security GPPA Questions and answers with CertsForce

Viewing page 8 out of 9 pages
Viewing questions 71-80 out of questions
Questions # 71:

You work as a Network Administrator for Net World Inc. You have configured a few routers on the company's network. You are required to accomplish the following goals:

• Encrypt all service passwords immediately.

• Ensure that encryption is also applied on the passwords changed in the future.

You run the following command service password-encryption.

Which of the goals will this action accomplish?

Options:

A.

The action will accomplish neither of the goals.


B.

The action will encrypt all passwords immediately.


C.

The action will accomplish both the goals.


D.

The action will ensure that encryption is also applied on the passwords changed in the future.


Expert Solution
Questions # 72:

Fill in the blank with the appropriate tool name.

__________ consists of flexible system architecture that provides a proper way for conducting industrial audits when it is required to identify unique positions of items.

Options:

A.

Network-based IDS


B.

Baseline audit


C.

Active IDS


D.

Honey pot detection


Expert Solution
Questions # 73:

Which of the following devices are used to implement Network Address Translation (NAT)?

Options:

A.

Routers and switches


B.

Routers and firewalls


C.

Firewalls and file servers


D.

Switches and firewalls


Expert Solution
Questions # 74:

Which of the following statements about Access control list (ACL) are true?

Each correct answer represents a complete solution. (Choose three.)

Options:

A.

Extended IP Access Control List permits or denies traffic from a specific source IP addresses or for a specific destination IP address, and port.


B.

Standard IP Access Control List permits or denies packets only from specific source IP addresses.


C.

Access control list filters packets or network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces.


D.

Extended IP Access Control List permits or denies packets only from a specific source IP addresses.


E.

Standard IP Access Control List can be used to permit or deny traffic from a specific source IP addresses or for a specific destination IP address, and port.


Expert Solution
Questions # 75:

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be most helpful against Denial of Service (DOS) attacks?

Options:

A.

Honey pot


B.

Network surveys


C.

Stateful Packet Inspection (SPI) firewall


D.

Packet filtering firewall


Expert Solution
Questions # 76:

Which of the following is the function of the editcap utility of Wireshark?

Options:

A.

To analyze data packets.


B.

To remove duplicate packets.


C.

To transfer data packets.


D.

To check data packets.


Expert Solution
Questions # 77:

Host-based IDS (HIDS) is an Intrusion Detection System that runs on the system to be monitored. HIDS monitors only the data that it is directed to, or originates from the system on which HIDS is installed. Besides monitoring network traffic for detecting attacks, it can also monitor other parameters of the system such as running processes, file system access and integrity, and user logins for identifying malicious activities.

Which of the following tools are examples of HIDS?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

HPing


B.

Legion


C.

Tripwire


D.

BlackIce Defender


Expert Solution
Questions # 78:

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.

Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:

A.

OpenSSH


B.

IPChains


C.

Stunnel


D.

IPTables


Expert Solution
Questions # 79:

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

Options:

A.

Cipher Block Chaining (CBC) Mode


B.

Electronic Codebook (ECB) Mode


C.

Propagating Cipher Block Chaining (PCBC) Mode


D.

Cipher Feedback (CFB) Mode


Expert Solution
Questions # 80:

Which of the following proxy servers is also referred to as transparent proxies or forced proxies?

Options:

A.

Intercepting proxy server


B.

Anonymous proxy server


C.

Reverse proxy server


D.

Tunneling proxy server


Expert Solution
Viewing page 8 out of 9 pages
Viewing questions 71-80 out of questions