GIAC GPPA GIAC Certified Perimeter Protection Analyst Online Training
GIAC GPPA Online Training
The questions for GPPA were last updated at Feb 19,2025.
- Exam Code: GPPA
- Exam Name: GIAC Certified Perimeter Protection Analyst
- Certification Provider: GIAC
- Latest update: Feb 19,2025
Which of the following applications cannot proactively detect anomalies related to a computer?
- A . NIDS
- B . HIDS
- C . Anti-virus scanner
- D . Firewall installed on the computer
You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based routed network. Two routers have been configured on the network. A router receives a packet.
Which of the following actions will the router take to route the incoming packet? Each correct answer represents a part of the solution. (Choose two.)
- A . Read the source IP address.
- B . Add the path covered by the packet to the routing table.
- C . Use the routing table to determine the best path to the destination network address.
- D . Read the destination IP address.
- E . Use the routing table to determine the best path to the source network address.
Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?
- A . Packet collision
- B . Network enumerating
- C . Packet crafting
- D . Distributed Checksum Clearinghouse
Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?
- A . Honeynet
- B . Production honeypot
- C . Research honeypot
- D . Honeyfarm
The simplest form of a firewall is a packet filtering firewall. Typically, a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets.
On which of the following layers of the Open System Interconnection (OSI) reference model do these routers filter information? Each correct answer represents a complete solution. (Choose all that apply.)
- A . Transport layer
- B . Data Link layer
- C . Physical layer
- D . Network layer
Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?
- A . Apache
- B . Snort
- C . SSH
- D . SUDO
Which of the following firewalls operates at three layers – Layer3, Layer4, and Layer5?
- A . Dynamic packet-filtering firewall
- B . Application layer firewall
- C . Proxy firewall
- D . Circuit-level firewall
Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?
- A . 2
- B . 0
- C . 1
- D . F
Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com.
He has successfully completed the following steps of the preattack phase:
>> Information gathering
>> Determining network range
>> Identifying active machines
>> Finding open ports and applications
>> OS fingerprinting
>> Fingerprinting services
Now Jain wants to perform network mapping of the ABC network.
Which of the following tools can he use to accomplish his task?
Each correct answer represents a complete solution. (Choose all that apply.)
- A . Traceroute
- B . Cheops
- C . NeoTrace
- D . Ettercap
Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access? Each correct answer represents a complete solution. (Choose two.)
- A . Tcpdump
- B . Ettercap
- C . Fragroute
- D . Mendax