GIAC GPPA GIAC Certified Perimeter Protection Analyst Online Training
GIAC GPPA Online Training
The questions for GPPA were last updated at Feb 20,2025.
- Exam Code: GPPA
- Exam Name: GIAC Certified Perimeter Protection Analyst
- Certification Provider: GIAC
- Latest update: Feb 20,2025
Which of the following actions can be taken as the countermeasures against the ARP spoofing attack? Each correct answer represents a complete solution. (Choose all that apply.)
- A . Placing static ARP entries on servers and routes
- B . Using Private VLANs
- C . Using 8 digit passwords for authentication
- D . Looking for large amount of ARP traffic on local subnets
You work as a Network Troubleshooter for ABC Inc. You want to tunnel the IPv6 traffic across an IPv4 supporting portion of the company’s network.
You are using the interface configuration mode for the tunnel.
Which of the following IP addresses will you enter after the tunnel source command?
- A . The IPv4 address assigned to the remote interface on which the tunnel is built.
- B . The IPv6 address assigned to the remote tunnel interface.
- C . The IPv6 address assigned to the local tunnel interface.
- D . The IPv4 address assigned to the local interface on which the tunnel is built.
An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner.
Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?
- A . IPsec
- B . NAT
- C . ACL
- D . Firewall
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. He is using a tool to crack the wireless encryption keys.
The description of the tool is as follows:
It is a Unix-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Chipertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.
Which of the following tools is John using to crack the wireless encryption keys?
- A . Kismet
- B . AirSnort
- C . PsPasswd
- D . Cain
Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?
- A . SysPCap
- B . libpcap
- C . WinPCap
- D . PCAP
Jain works as a contract Ethical Hacker. He has recently got a project to do security checking for www.abc.com. He wants to find out the operating system of the ABC server in the information gathering step.
Which of the following commands will he use to accomplish the task? Each correct answer represents a complete solution. (Choose two.)
- A . nc -v -n 208.100.2.25 80
- B . nmap -v -O www.abc.com
- C . nmap -v -O 208.100.2.25
- D . nc 208.100.2.25 23
Which of the following protocols is used by voice over IP (VoIP) applications?
- A . IPv6
- B . TCP
- C . ICMP
- D . UDP
You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based network. A Cisco switch is configured on the network. You change the original host name of the switch through the hostname command. The prompt displays the changed host name. After some time, power of the switch went off due to some reason. When power restored, you find that the prompt is displaying the old host name.
What is the most likely cause?
- A . The running-config file got corrupted.
- B . The changes were saved in running-config file.
- C . The startup-config file got corrupted.
- D . Host name cannot be changed permanently once switch is configured.
At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?
- A . The Data-Link layer
- B . The Physical layer
- C . The Network layer
- D . The Presentation layer
Which of the following vulnerability scanners is used to test Web servers for dangerous files/CGIs, outdated server software, and other problems?
- A . Hackbot
- B . Nikto
- C . Nessus
- D . Nmap