GIAC GPPA GIAC Certified Perimeter Protection Analyst Online Training
GIAC GPPA Online Training
The questions for GPPA were last updated at Feb 16,2025.
- Exam Code: GPPA
- Exam Name: GIAC Certified Perimeter Protection Analyst
- Certification Provider: GIAC
- Latest update: Feb 16,2025
Which of the following tools is an open source protocol analyzer that can capture traffic in real time?
- A . Snort
- B . NetWitness
- C . Wireshark
- D . Netresident
You are implementing a host based intrusion detection system on your web server. You feel that the best way to monitor the web server is to find your baseline of activity (connections, traffic, etc.) and to monitor for conditions above that baseline.
This type of IDS is called __________.
- A . Signature Based
- B . Reactive IDS
- C . Anomaly Based
- D . Passive IDS
Which of the following are open-source vulnerability scanners? (Choose three.)
- A . Nessus
- B . Hackbot
- C . Nikto
- D . NetRecon
Suppose you are working as a Security Administrator at ABC Inc. The company has a switched network. You have configured tcpdump in the network which can only see traffic addressed to itself and broadcast traffic.
What will you do when you are required to see all traffic of the network?
- A . Connect the sniffer device to a Switched Port Analyzer (SPAN) port.
- B . Connect the sniffer device to a Remote Switched Port Analyzer (RSPAN) port.
- C . Configure Network Access Control (NAC).
- D . Configure VLAN Access Control List (VACL).
Which of the following techniques is used to identify attacks originating from a botnet?
- A . Recipient filtering
- B . BPF-based filter
- C . IFilter
- D . Passive OS fingerprinting
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.
Which of the following tools can you use to accomplish the task?
- A . P0f
- B . Superscan
- C . Nmap
- D . NBTscan
Which of the following protocols is used by TFTP as a file transfer protocol?
- A . SMTP
- B . UDP
- C . TCP
- D . SNMP
Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. (Choose three.)
- A . Analyze
- B . Acquire
- C . Authenticate
- D . Encrypt
Which of the following monitors program activities and modifies malicious activities on a system?
- A . HIDS
- B . Back door
- C . NIDS
- D . RADIUS
Which of the following wireless security features provides the best wireless security mechanism?
- A . WPA with Pre Shared Key
- B . WPA
- C . WPA with 802.1X authentication
- D . WEP