Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GPPA GIAC Certified Perimeter Protection Analyst Questions and Answers

Questions 4

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.abc.com. You have searched all open ports of the ABC server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting.

Which of the following tools can you use to accomplish the task?

Options:

A.

P0f

B.

Superscan

C.

Nmap

D.

NBTscan

Buy Now
Questions 5

You work as a System Administrator for ABC Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. Your network is configured for IPv6 IP addressing.

Which of the following commands will you use to test TCP/IP connectivity?

Options:

A.

ping

B.

ping6

C.

traceroute

D.

ifconfig

Buy Now
Questions 6

Which of the following protocols is used by TFTP as a file transfer protocol?

Options:

A.

SMTP

B.

UDP

C.

TCP

D.

SNMP

Buy Now
Questions 7

Which of the following statements about a host-based intrusion prevention system (HIPS) are true?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

It cannot detect events scattered over the network.

B.

It can handle encrypted and unencrypted traffic equally.

C.

It can detect events scattered over the network.

D.

It is a technique that allows multiple computers to share one or more IP addresses.

Buy Now
Questions 8

Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

Options:

A.

Cipher Block Chaining (CBC) Mode

B.

Electronic Codebook (ECB) Mode

C.

Propagating Cipher Block Chaining (PCBC) Mode

D.

Cipher Feedback (CFB) Mode

Buy Now
Questions 9

Which of the following number ranges is used for the IP Standard ACL?

Options:

A.

100-199

B.

1-99

C.

600-699

D.

1000-1099

Buy Now
Questions 10

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The network is configured on IP version 6 protocol. All the computers on the network are connected to a switch device. One day, users complain that they are unable to connect to a file server. You try to ping the client computers from the server, but the pinging fails. You try to ping the server ' s own loopback address, but it fails to ping. You restart the server, but the problem persists.

What is the most likely cause?

Options:

A.

The server ' s NIC is not working.

B.

Automatic IP addressing is not working.

C.

The server is configured with unspecified IP address.

D.

The cable that connects the server to the switch is broken.

E.

The switch device is not working.

Buy Now
Questions 11

Which of the following statements about Access control list (ACL) are true?

Each correct answer represents a complete solution. (Choose three.)

Options:

A.

Extended IP Access Control List permits or denies traffic from a specific source IP addresses or for a specific destination IP address, and port.

B.

Standard IP Access Control List permits or denies packets only from specific source IP addresses.

C.

Access control list filters packets or network traffic by controlling whether routed packets are forwarded or blocked at the router ' s interfaces.

D.

Extended IP Access Control List permits or denies packets only from a specific source IP addresses.

E.

Standard IP Access Control List can be used to permit or deny traffic from a specific source IP addresses or for a specific destination IP address, and port.

Buy Now
Questions 12

Which of the following group management messages is used by routers to handle the IPv6 multicast routing?

Options:

A.

OSPF

B.

ARP

C.

ICMPv6

D.

IGMP

Buy Now
Questions 13

Which of the following statements about segmentation of a network using router is true?

Each correct answer represents a complete solution. (Choose three.)

Options:

A.

Broadcast will not be forwarded to other segment through the router.

B.

Number of broadcast domains will be decreased.

C.

Filtering can be done based on layer 3 information.

D.

Segmenting of a network using router will increase latency.

Buy Now
Questions 14

You work as a Network Administrator for ABC Inc. You want to configure Snort as an IDS for your company ' s wireless network, but you are concerned that Snort does not support all types of traffic.

What traffic does Snort support?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

ICMP

B.

UDP

C.

TCP

D.

IP

Buy Now
Questions 15

Which of the following tools detects certain types of packet filters and NAT setups?

Options:

A.

Passive OS fingerprinting

B.

TShark

C.

Vulnerability scanner

D.

Wireshark

Buy Now
Questions 16

Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com.

He has successfully completed the following steps of the preattack phase:

> > Information gathering

> > Determining network range

> > Identifying active machines

> > Finding open ports and applications

> > OS fingerprinting

> > Fingerprinting services

Now Jain wants to perform network mapping of the ABC network.

Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Traceroute

B.

Cheops

C.

NeoTrace

D.

Ettercap

Buy Now
Questions 17

Which of the following devices works as a transparent bridge between the wireless clients and the wired network?

Options:

A.

Hub

B.

Access point

C.

Switch

D.

Wireless router

Buy Now
Questions 18

Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?

Options:

A.

LogIDS 1.0

B.

WIDS

C.

Snort 2.1.0

D.

NFR security

Buy Now
Questions 19

Which of the following statements are true about the Network Honeypot a rulebase?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Its operation setting toggles between the network honeypot on and off.

B.

Its rules are triggered when a source IP address sends a connection request to the destination IP address and service specified in the rule.

C.

It does not support any IP action.

D.

It is used to detect reconnoitering activities.

Buy Now
Questions 20

Which of the following Wireless LAN standard devices is least affected by interference from domestic appliances such as microwave ovens?

Options:

A.

802.11a

B.

802.11b

C.

802.11

D.

802.11g

Buy Now
Questions 21

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP network. You have been assigned a task to configure security mechanisms for the network of the company. You have decided to configure a packet filtering firewall.

Which of the following may be the reasons that made you choose a packet filtering firewall as a security mechanism?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

It is easy to install packet filtering firewalls in comparison to the other network security solutions.

B.

It makes security transparent to end-users which provide easy use of the client applications.

C.

It prevents application-layer attacks.

D.

It easily matches most of the fields in Layer 3 packets and Layer 4 segment headers, and thus, provides a lot of flexibility in implementing security policies.

Buy Now
Questions 22

Jain works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.abc.com.

He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the ABC server.

To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus.

Which of the following IDS evasion attacks is John performing?

Options:

A.

Evasion attack

B.

Polymorphic shell code attack

C.

Insertion attack

D.

Session splicing attack

Buy Now
Questions 23

Which of the following commands is recommended by Cisco for latest switches and routers to erase the contents of NVRAM?

Options:

A.

reload

B.

erase startup-config

C.

erase nvram:

D.

write erase

Buy Now
Questions 24

You work as a Network Administrator for ABC Inc. The company has a TCP/IP network. You have been assigned a task to configure a stateful packet filtering firewall to secure the network of the company. You are encountering some problems while configuring the stateful packet filtering firewall.

Which of the following can be the reasons for your problems?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

It contains additional overhead of maintaining a state table.

B.

It has limited logging capabilities.

C.

It has to open up a large range of ports to allow communication.

D.

It is complex to configure.

Buy Now
Questions 25

You work as a Network Administrator for a bank. For securing the bank ' s network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network. After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed.

What type of response is the IDS giving?

Options:

A.

False Negative

B.

False Positive

C.

True Positive

D.

True Negative

Buy Now
Questions 26

Which of the following firewalls operates at three layers - Layer3, Layer4, and Layer5?

Options:

A.

Dynamic packet-filtering firewall

B.

Application layer firewall

C.

Proxy firewall

D.

Circuit-level firewall

Buy Now
Questions 27

You work as a technician for ABC Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones.

Which of the following commands will you use?

Options:

A.

ping -a

B.

ping -4

C.

ping -t

D.

ping -l

Buy Now
Questions 28

Address Resolution Protocol (ARP) spoofing, also known as ARP poisoning or ARP Poison Routing (APR), is a technique used to attack an Ethernet wired or wireless network. ARP spoofing may allow an attacker to sniff data frames on a local area network (LAN), modify the traffic, or stop the traffic altogether. The principle of ARP spoofing is to send fake ARP messages to an Ethernet LAN.

What steps can be used as a countermeasure of ARP spoofing?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Using smash guard utility.

B.

Using ARP Guard utility.

C.

Using static ARP entries on servers, workstation and routers.

D.

Using ARP watch utility.

E.

Using IDS Sensors to check continually for large amount of ARP traffic on local subnets.

Buy Now
Questions 29

On which of the following interfaces of the router is the clock rate command used?

Options:

A.

DCE

B.

ETHERNET

C.

DTE

D.

VIRTUAL LINE VTY

Buy Now
Questions 30

Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?

Options:

A.

IPS

B.

NIDS

C.

HIDS

D.

DMZ

Buy Now
Questions 31

Which of the following types of firewall ensures that the packets are part of the established session?

Options:

A.

Circuit-level firewall

B.

Switch-level firewall

C.

Application-level firewall

D.

Stateful inspection firewall

Buy Now
Questions 32

Which of the following techniques correlates information found on multiple hard drives?

Options:

A.

Live analysis

B.

Gap analysis

C.

Data analysis

D.

Cross-drive analysis

Buy Now
Questions 33

You work as a Security Manager for Tech Perfect Inc. The company has a Windows-based network. You want to scroll real-time network traffic to a command console in a readable format.

Which of the following command line utilities will you use to accomplish the task?

Options:

A.

WinDump

B.

libpcap

C.

WinPcap

D.

iptables

Buy Now
Questions 34

You work as a Network Administrator for NetTech Inc. You want to prevent your network from Ping flood attacks.

Which of the following protocols will you block to accomplish this task?

Options:

A.

IP

B.

FTP

C.

PPP

D.

ICMP

Buy Now
Questions 35

Which of the following is a Cisco IOS management term described in the statement below?

" It is the fourth digit in the configuration register and contains a hexadecimal value. The bootstrap program uses its value to choose which operating system to load into RAM " .

Options:

A.

Boot value

B.

Boot field

C.

Boot

D.

Boot check

Buy Now
Questions 36

Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router ' s logs and notices that the unfamiliar machine has the same MAC address as his laptop.

Which of the following attacks has been occurred on the wireless network of Adam?

Options:

A.

ARP spoofing

B.

NAT spoofing

C.

MAC spoofing

D.

DNS cache poisoning

Buy Now
Questions 37

The general form of the Cisco IOS is a.b.c.de.

Which of the following indicates the major version number of the Cisco IOS?

Options:

A.

b

B.

a

C.

e

D.

d

Buy Now
Questions 38

WinDump, tcpdump, and Wireshark specify which fields of information libpcap should record.

Which of the following filters do they use in order to accomplish the task?

Options:

A.

FIR filter

B.

IM filter

C.

Web filter

D.

Berkeley Packet Filter

Buy Now
Questions 39

The promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it.

Which of the following tools works by placing the host system network card into the promiscuous mode?

Options:

A.

Sniffer

B.

THC-Scan

C.

NetStumbler

D.

Snort

Buy Now
Questions 40

Which of the following is a valid IPv6 address?

Options:

A.

45CF. 6D53: 12CD. AFC7: E654: BB32: 54AT: FACE

B.

45CF. 6D53: 12CD. AFC7: E654: BB32: 543C. FACE

C.

123.111.243.123

D.

45CF. 6D53: 12KP: AFC7: E654: BB32: 543C. FACE

Buy Now
Questions 41

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

Options:

A.

Sniffer

B.

Dsniff

C.

Snort

D.

Nikto

Buy Now
Questions 42

The simplest form of a firewall is a packet filtering firewall. Typically, a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets.

On which of the following layers of the Open System Interconnection (OSI) reference model do these routers filter information?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Transport layer

B.

Data Link layer

C.

Physical layer

D.

Network layer

Buy Now
Questions 43

An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner.

Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

Options:

A.

IPsec

B.

NAT

C.

ACL

D.

Firewall

Buy Now
Questions 44

Which of the following tools uses PDA and barcode technologies in order to enable effective identification, control, and reporting of items in a site?

Options:

A.

Biometric device

B.

Smart card

C.

Baseline audit

D.

Vulnerability scanner

Buy Now
Questions 45

Which of the following modes is also referred to as client mode?

Options:

A.

Ad-hoc mode

B.

Manage mode

C.

Monitor mode

D.

Master mode

Buy Now
Questions 46

Which of the following can be used in an extended access list to filter traffic?

Each correct answer represents a part of the solution. (Choose all that apply.)

Options:

A.

Source IP address

B.

Protocol

C.

Destination IP address

D.

TCP or UDP port number

E.

Destination MAC address

Buy Now
Questions 47

Which of the following techniques is used to identify attacks originating from a botnet?

Options:

A.

Recipient filtering

B.

BPF-based filter

C.

IFilter

D.

Passive OS fingerprinting

Buy Now
Questions 48

You work as a Network Architect for Tech Perfect Inc. The company has a corporate LAN network. You will have to perform the following tasks:

• Limit events that occur from security threats such as viruses, worms, and spyware.

• Restrict access to the network based on identity or security posture.

Which of the following services will you deploy in the network to accomplish the tasks?

Options:

A.

Protocol-Independent Multicast

B.

Firewall Service Module

C.

Network Admission Control

D.

NetFlow

Buy Now
Questions 49

Which of the following devices is used to identify out-of-date software versions, applicable patches, system upgrades, etc?

Options:

A.

Retinal scanner

B.

Vulnerability scanner

C.

Fingerprint reader

D.

Smart card reader

Buy Now
Questions 50

Which of the following is the function of the editcap utility of Wireshark?

Options:

A.

To analyze data packets.

B.

To remove duplicate packets.

C.

To transfer data packets.

D.

To check data packets.

Buy Now
Questions 51

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.

Stateful firewall

B.

Proxy-based firewall

C.

Endian firewall

D.

Packet filter firewall

Buy Now
Questions 52

Which of the following is an attack with IP fragments that cannot be reassembled?

Options:

A.

Password guessing attack

B.

Smurf attack

C.

Teardrop attack

D.

Dictionary attack

Buy Now
Questions 53

Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

Options:

A.

Honeynet

B.

Production honeypot

C.

Research honeypot

D.

Honeyfarm

Buy Now
Questions 54

Which of the following firewalls filters the traffic based on the header of the datagram?

Options:

A.

Circuit-level firewall

B.

Application-level firewall

C.

Packet filtering firewall

D.

Stateful inspection firewall

Buy Now
Questions 55

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WPA with Pre Shared Key

B.

WPA

C.

WPA with 802.1X authentication

D.

WEP

Buy Now
Questions 56

You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company ' s networks.

Which of the following applications will you use to accomplish the task?

Options:

A.

Network enumerator

B.

Port scanner

C.

Web application security scanner

D.

Computer worm

Buy Now
Questions 57

Which of the following fields are specified when rules are created for the Network Honeypot rulebase?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

A destination/service match condition

B.

Detection settings

C.

Response options

D.

Operation mode

Buy Now
Questions 58

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

Options:

A.

DOS boot disk

B.

EnCase with a hardware write blocker

C.

Linux Live CD

D.

Secure Authentication for EnCase (SAFE)

Buy Now
Questions 59

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel.

Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

DES

B.

Blowfish

C.

RC4

D.

IDEA

Buy Now
Questions 60

Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel between two networked devices.

Which of the following features are supported by Secure Shell?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

SSH uses the client-server model.

B.

SSH can transfer files using the associated HTTP or FTP protocols.

C.

SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections.

D.

SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.

Buy Now
Questions 61

Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?

Options:

A.

2

B.

0

C.

1

D.

F

Buy Now
Questions 62

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Packet filtering firewall

B.

Stateful inspection firewall

C.

Application-level firewall

D.

Circuit-level firewall

Buy Now
Questions 63

Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?

Options:

A.

Packet collision

B.

Network enumerating

C.

Packet crafting

D.

Distributed Checksum Clearinghouse

Buy Now
Questions 64

Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?

Options:

A.

Overclocking

B.

Dynamic NAT

C.

Overloading

D.

Static NAT

Buy Now
Questions 65

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

GPPA Question 65

Which of the following tools can be used as a countermeasure to such an attack?

Options:

A.

SmashGuard

B.

Obiwan

C.

Kismet

D.

Absinthe

Buy Now
Questions 66

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo.

Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Temporary Internet Folder

B.

History folder

C.

Download folder

D.

Cookies folder

Buy Now
Questions 67

You are the Network Administrator for a college. Wireless access is widely used at the college. You want the most secure wireless connections you can have.

Which of the following would you use?

Options:

A.

WEP

B.

WPA2

C.

WPA

D.

WEP2

Buy Now
Questions 68

Sam works as a Security Manager for ABC Inc. The company has a Windows-based network. Sam wants to prevent specific traffic from IDP processing in order to reduce false positives.

Which of the following rulebases will he use to accomplish the task?

Options:

A.

Network Honeypot rulebase

B.

Backdoor rulebase

C.

SYN Protector rulebase

D.

Exempt rulebase

Buy Now
Questions 69

You work as a Network Security Administrator for NetPerfect Inc. The company has a Windowsbased network. You are in charge of the data and network security of the company. While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential data.

What type of threat is this?

Options:

A.

Zombie

B.

External threat

C.

Malware

D.

Internal threat

Buy Now
Questions 70

Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

Options:

A.

Host-based intrusion detection system (HIDS)

B.

Protocol-based intrusion detection system (PIDS)

C.

Network intrusion detection system (NIDS)

D.

Application protocol-based intrusion detection system (APIDS)

Buy Now
Questions 71

Jain works as a Security Manager for ABC Inc. The company has a Windows-based network.

Jain has been assigned a project to detect the services used by an attack to access the network. For this purpose, he is required to use the predefined service objects of the rulebase. This predefined service object defines the services used in the attack to access the network.

Which of the following objects will he create when he finds that the attack is not defined in the predefined service objects?

Options:

A.

Custom service objects

B.

Compound attack objects

C.

Signature attack objects

D.

Protocol anomaly attack objects

Buy Now
Questions 72

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

Options:

A.

Smurf

B.

Social engineering

C.

Denial-of-Service

D.

Man-in-the-middle

Buy Now
Questions 73

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small-sized packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack signatures of such attacks.

Which of the following tools can be used to perform session splicing attacks?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

Y.A.T.

B.

Fragroute

C.

Whisker

D.

Nessus

Buy Now
Questions 74

Which of the following statements about an IDP rule base notification are true?

Options:

A.

When an action is performed, a notification defines how to log information.

B.

It is used to specify the type of network traffic that has to be monitored for attacks.

C.

It can be defined as reusable logical entities that the user can apply to the rules.

D.

It directs an IDP to drop or close the connection.

Buy Now
Questions 75

Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?

Options:

A.

IPSec

B.

WPA

C.

WEP

D.

L2TP

Buy Now
Questions 76

You send and receive messages on Internet. A man-in-the-middle attack can be performed to capture and read your message.

Which of the following Information assurance pillars ensures the security of your message or data against this type of attack?

Options:

A.

Confidentiality

B.

Data availability

C.

Authentication

D.

Non-repudiation

Buy Now
Questions 77

Which of the following types of Intrusion Detection Systems consists of an agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state?

Options:

A.

APIDS

B.

PIDS

C.

NIDS

D.

HIDS

Buy Now
Questions 78

Which of the following is a version of netcat with integrated transport encryption capabilities?

Options:

A.

Encat

B.

Nikto

C.

Socat

D.

Cryptcat

Buy Now
Questions 79

Which of the following vulnerability scanners detects vulnerabilities by actually performing attacks?

Options:

A.

Port scanner

B.

Computer worm

C.

Network enumerator

D.

Web application security scanner

Buy Now
Questions 80

In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?

Options:

A.

Insertion

B.

Fragmentation overlap

C.

Fragmentation overwrite

D.

Session splicing

Buy Now
Questions 81

Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows-based environment. The company ' s employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network. Andrew is therefore assigned the task to recover the deleted mails.

Which of the following tools can Andrew use to accomplish the task?

Each correct answer represents a complete solution. (Choose two.)

Options:

A.

FINALeMAIL

B.

EventCombMT

C.

R-mail

D.

eMailTrackerPro

Buy Now
Questions 82

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data.

Which of the following tools can he use to accomplish the task?

Options:

A.

Hunt

B.

Mendax

C.

Alchemy Remote Executor

D.

Ettercap

Buy Now
Questions 83

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP ' s DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command.

Which of the following commands will you use?

Options:

A.

ping -l

B.

ping -t

C.

ping -a

D.

ping -n

Buy Now
Questions 84

In which of the following situations does legal and authorized traffic cause an intrusion detection system (IDS) to generate an alert and slow down performance?

Each correct answer represents a complete solution. (Choose all that apply.)

Options:

A.

False alert

B.

False positives

C.

False generation

D.

False illusion

Buy Now
Questions 85

Which of the following files is a Cisco IOS configuration file that resides in RAM?

Options:

A.

temp-config

B.

running-config

C.

startup-config

D.

ram-config

Buy Now
Exam Code: GPPA
Exam Name: GIAC Certified Perimeter Protection Analyst
Last Update: Apr 30, 2026
Questions: 285

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now GPPA testing engine

PDF (Q&A)

$43.57  $124.49
buy now GPPA pdf