GIAC GPPA GIAC Certified Perimeter Protection Analyst Online Training
GIAC GPPA Online Training
The questions for GPPA were last updated at Feb 19,2025.
- Exam Code: GPPA
- Exam Name: GIAC Certified Perimeter Protection Analyst
- Certification Provider: GIAC
- Latest update: Feb 19,2025
What are the advantages of stateless autoconfiguration in IPv6?
Each correct answer represents a part of the solution. (Choose three.)
- A . Ease of use.
- B . It provides basic authentication to determine which systems can receive configuration data.
- C . No host configuration is necessary.
- D . No server is needed for stateless autoconfiguration.
Jain works as a professional Ethical Hacker.
He has been assigned the project of testing the security of www.abc.com. In order to do so, he performs the following steps of the preattack phase successfully:
• Information gathering
• Determination of network range
• Identification of active systems
• Location of open ports and applications
Now, which of the following tasks should he perform next?
- A . Install a backdoor to log in remotely on the We-are-secure server.
- B . Map the network of We-are-secure Inc.
- C . Fingerprint the services running on the we-are-secure network.
- D . Perform OS fingerprinting on the We-are-secure network.
You work as a technician for ABC Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones.
Which of the following commands will you use?
- A . ping -a
- B . ping -4
- C . ping -t
- D . ping -l
Sam works as a Security Manager for ABC Inc. He has been assigned a project to detect reconnoitering activities. For this purpose, he has deployed a system in the network that attracts the attention of an attacker.
Which of the following rulebases will he use to accomplish the task?
- A . Backdoor rulebase
- B . Network Honeypot rulebase
- C . Exempt rulebase
- D . SYN Protector rulebase
Which of the following is a valid IPv6 address?
- A . 45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE
- B . 45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE
- C . 123.111.243.123
- D . 45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE
Which of the following well-known ports is used by BOOTP?
- A . UDP 67
- B . TCP 21
- C . UDP 69
- D . TCP 161
Which of the following well-known ports is used by BOOTP?
- A . UDP 67
- B . TCP 21
- C . UDP 69
- D . TCP 161
Which of the following well-known ports is used by BOOTP?
- A . UDP 67
- B . TCP 21
- C . UDP 69
- D . TCP 161
10.0.0/24
Which of the following sets of commands will you use to accomplish the task?
- A . access-list 10 permit 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255 access-list 10 deny any line vty 0 4 access-group 10 in
- B . access-list 10 permit host 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255 access-list 10 deny any line vty 0 4 access-class 10 out
- C . access-list 10 permit host 10.10.2.103 access-list 10 permit 10.10.0.0 0.0.0.255 access-list 10 deny any line vty 0 4 access-class 10 in
- D . access-list 10 permit host 10.10.2.103 access-list 11 permit host 10.10.0.0 255.255.255.0 access-list 12 deny any line vty 0 4 access-group 10, 11, 12 in
Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?
- A . Sniffer
- B . tcptraceroute
- C . Fpipe
- D . tcptrace