GIAC GPPA GIAC Certified Perimeter Protection Analyst Online Training
GIAC GPPA Online Training
The questions for GPPA were last updated at Feb 19,2025.
- Exam Code: GPPA
- Exam Name: GIAC Certified Perimeter Protection Analyst
- Certification Provider: GIAC
- Latest update: Feb 19,2025
Which of the following is a version of netcat with integrated transport encryption capabilities?
- A . Encat
- B . Nikto
- C . Socat
- D . Cryptcat
Which of the following are packet filtering tools for the Linux operating system? Each correct answer represents a complete solution. (Choose all that apply.)
- A . IPTables
- B . IPFilter
- C . Zone Alarm
- D . BlackICE
You work as a Network Administrator for ABC Inc. The company has a corporate intranet setup. A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork.
Which of the following steps will you take to accomplish the task?
- A . Block the UDP protocol through ACL.
- B . Block the IPv6 protocol through ACL.
- C . Block the TCP protocol through ACL.
- D . Block the ICMP protocol through ACL.
You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world.
What tool would you use to accomplish this?
- A . Packet sniffer
- B . Network mapper
- C . Protocol analyzer
- D . A port scanner
You work as a Network Administrator for ABC Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing.
Which of the following types of addresses are supported by IPv6? Each correct answer represents a complete solution. (Choose all that apply.)
- A . Broadcast
- B . Multicast
- C . Anycast
- D . Unicast
Which of the following is used for debugging the network setup itself by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem?
- A . Netfilter
- B . iptables
- C . WinPcap
- D . tcpdump
You work as a Network Administrator for ABC Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices.
What will you do?
- A . Implement a WIPS.
- B . Implement a dynamic NAT.
- C . Implement a firewall.
- D . Implement an ACL.
You work as a Network Administrator for ABC Inc. The company has a TCP/IP network. You have been assigned a task to configure a stateful packet filtering firewall to secure the network of the company. You are encountering some problems while configuring the stateful packet filtering firewall.
Which of the following can be the reasons for your problems? Each correct answer represents a complete solution. (Choose all that apply.)
- A . It contains additional overhead of maintaining a state table.
- B . It has limited logging capabilities.
- C . It has to open up a large range of ports to allow communication.
- D . It is complex to configure.
John works as a Security Manager for Gentech Inc. He uses an IDP engine to detect the type of interactive traffic produced during an attack in which the attacker wants to install the mechanism on a host system that facilitates the unauthorized access and breaks the system confidentiality.
Which of the following rulebases will he use to accomplish the task?
- A . Traffic Anomalies rulebase
- B . SYN Protector rulebase
- C . Backdoor rulebase
- D . Exempt rulebase
Which of the following attacking methods allows the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer by changing the Media Access Control address?
- A . VLAN hoping
- B . ARP spoofing
- C . IP address spoofing
- D . MAC spoofing