시험덤프
매달, 우리는 1000명 이상의 사람들이 시험 준비를 잘하고 시험을 잘 통과할 수 있도록 도와줍니다.
  / GPPA 덤프  / GPPA 문제 연습

GIAC GPPA 시험

GIAC Certified Perimeter Protection Analyst 온라인 연습

최종 업데이트 시간: 2024년11월08일

당신은 온라인 연습 문제를 통해 GIAC GPPA 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.

시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 GPPA 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 285개의 시험 문제와 답을 포함하십시오.

 / 4

Question No : 1


Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

정답:

Question No : 2


An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network.
Which of the following processes does an IDS perform? Each correct answer represents a complete solution. (Choose all that apply.)

정답:

Question No : 3


Which of the following vulnerability scanners is used to test Web servers for dangerous files/CGIs, outdated server software, and other problems?

정답:

Question No : 4


At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

정답:

Question No : 5


You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based network. A Cisco switch is configured on the network. You change the original host name of the switch through the hostname command. The prompt displays the changed host name. After some time, power of the switch went off due to some reason. When power restored, you find that the prompt is displaying the old host name.
What is the most likely cause?

정답:

Question No : 6


Which of the following protocols is used by voice over IP (VoIP) applications?

정답:

Question No : 7


Jain works as a contract Ethical Hacker. He has recently got a project to do security checking for www.abc.com. He wants to find out the operating system of the ABC server in the information gathering step.
Which of the following commands will he use to accomplish the task? Each correct answer represents a complete solution. (Choose two.)

정답:

Question No : 8


Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?

정답:

Question No : 9


John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. He is using a tool to crack the wireless encryption keys.
The description of the tool is as follows:
It is a Unix-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Chipertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.
Which of the following tools is John using to crack the wireless encryption keys?

정답:

Question No : 10


An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner.
Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

정답:

Question No : 11


You work as a Network Troubleshooter for ABC Inc. You want to tunnel the IPv6 traffic across an IPv4 supporting portion of the company's network.
You are using the interface configuration mode for the tunnel.
Which of the following IP addresses will you enter after the tunnel source command?

정답:

Question No : 12


Which of the following actions can be taken as the countermeasures against the ARP spoofing attack? Each correct answer represents a complete solution. (Choose all that apply.)

정답:

Question No : 13


Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

정답:

Question No : 14


10.0.0/24
Which of the following sets of commands will you use to accomplish the task?

정답:

Question No : 15


Which of the following well-known ports is used by BOOTP?

정답:

 / 4
GIAC