Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GIAC GPPA Based on Real Exam Environment

Page: 4 / 11
Total 285 questions

GIAC Certified Perimeter Protection Analyst Questions and Answers

Question 13

Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of In order to do so, he performs the following steps of the preattack phase successfully:

• Information gathering

• Determination of network range

• Identification of active systems

• Location of open ports and applications 

Now, which of the following tasks should he perform next?

Options:

A.

Install a backdoor to log in remotely on the We-are-secure server.

B.

Map the network of We-are-secure Inc.

C.

Fingerprint the services running on the we-are-secure network.

D.

Perform OS fingerprinting on the We-are-secure network.

Question 14

Which of the following program loads IOS image into RAM?

Options:

A.

POST

B.

NVRAM

C.

Bootstrap

D.

TFTP

Question 15

Which of the following can provide security against man-in-the-middle attack?

Options:

A.

Anti-virus programs

B.

Strong data encryption during travel

C.

Strong authentication method

D.

Firewall

Question 16

Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

Options:

A.

Apache

B.

Snort

C.

SSH

D.

SUDO

Page: 4 / 11
Total 285 questions