New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free Access GIAC GPPA New Release

Page: 5 / 11
Total 285 questions

GIAC Certified Perimeter Protection Analyst Questions and Answers

Question 17

Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool.

Which of the following tools is Adam using?

Options:

A.

HxD

B.

Vedit

C.

WinHex

D.

Evidor

Question 18

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.

Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:

A.

OpenSSH

B.

IPChains

C.

Stunnel

D.

IPTables

Question 19

Which of the following is like a malicious cache poisoning where fake data is placed in the cache of the name servers?

Options:

A.

DNS spoofing

B.

SYN flood attack

C.

Smurf attack

D.

Host name spoofing

Question 20

Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?

Options:

A.

Packet collision

B.

Network enumerating

C.

Packet crafting

D.

Distributed Checksum Clearinghouse

Page: 5 / 11
Total 285 questions