New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Cyber Security GPPA Full Course Free

Page: 11 / 11
Total 285 questions

GIAC Certified Perimeter Protection Analyst Questions and Answers

Question 41

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.

Stateful firewall

B.

Proxy-based firewall

C.

Endian firewall

D.

Packet filter firewall

Question 42

In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?

Options:

A.

Insertion

B.

Fragmentation overlap

C.

Fragmentation overwrite

D.

Session splicing

Page: 11 / 11
Total 285 questions