Pass the GIAC Cyber Security GPPA Questions and answers with CertsForce

Viewing page 9 out of 9 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following attacks are prevented from a mutual authentication solution?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Phishing


B.

Eavesdropping attack


C.

Man-in-the-middle attack


D.

Hijacking


Expert Solution
Questions # 82:

As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com.

Which of the following nmap switches have you used to accomplish the task?

Options:

A.

nmap -sS


B.

nmap -sT


C.

nmap -vO


D.

nmap -sO


Expert Solution
Questions # 83:

Which of the following is a console-based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system?

Options:

A.

Kismet


B.

Hping2


C.

Nemesis


D.

Scapy


Expert Solution
Questions # 84:

Which of the following actions can be taken as the countermeasures against the ARP spoofing attack?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Placing static ARP entries on servers and routes


B.

Using Private VLANs


C.

Using 8 digit passwords for authentication


D.

Looking for large amount of ARP traffic on local subnets


Expert Solution
Questions # 85:

Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

Options:

A.

Dynamic NAT


B.

Static NAT


C.

Cache NAT


D.

Port Address Translation (PAT)


Expert Solution
Viewing page 9 out of 9 pages
Viewing questions 81-90 out of questions