Which of the following tools is described below?
It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.
Which of the following actions can be taken as the countermeasures against the ARP spoofing attack?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following tools uses PDA and barcode technologies in order to enable effective identification, control, and reporting of items in a site?
Suppose you are working as a Security Administrator at ABC Inc. The company has a switched network. You have configured tcpdump in the network which can only see traffic addressed to itself and broadcast traffic.
What will you do when you are required to see all traffic of the network?
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone.
Which of the following commands will you use to accomplish the task?
You work as a Network Administrator for NetTech Inc. You want to prevent your network from Ping flood attacks.
Which of the following protocols will you block to accomplish this task?
Which of the following is a console-based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system?
Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel between two networked devices.
Which of the following features are supported by Secure Shell?
Each correct answer represents a complete solution. (Choose all that apply.)
You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted.
What tool would you use to accomplish this?
Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small-sized packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack signatures of such attacks.
Which of the following tools can be used to perform session splicing attacks?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following firewalls filters the traffic based on the header of the datagram?
You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks.
Which of the following measures will you take over the site network devices of the network?
You work as a Desktop Support Technician for umbrella Inc. The company uses a Windows-based network. An employee from the sales department is facing problem in the IP configuration of the network connection. He called you to resolve the issue. You suspect that the IP configuration is not configured properly. You want to use the ping command to ensure that IPv4 protocol is working on a computer.
While running the ping command from the command prompt, you find that Windows Firewall is blocking the ping command.
What is the cause of the issue?
The stateful firewalls combine the significant flows into conversations.
Which of the following properties is used to classify a flow?
Each correct answer represents a part of the solution. (Choose all that apply.)
You work as a Network Administrator for ABC Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address.
Which of the following types of addresses will you choose?
Rick works as the Security Manager for ABC Inc. He wants to continue the evaluation of rules according to the ordered list to identify matches even if a match is found.
Which of the following rulebases will he use to accomplish the task?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?
John works as a Network Administrator for Web Perfect Inc. The company has a wireless LAN network. John has configured shared key authentication on a client. The client and the AP start exchanging the frames to enable authentication.
Which of the following vulnerabilities may occur while the client and the AP exchange the challenge text over the wireless link?
You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based routed network. Two routers have been configured on the network. A router receives a packet.
Which of the following actions will the router take to route the incoming packet?
Each correct answer represents a part of the solution. (Choose two.)
Which of the following features does the Nmap utility have?
Each correct answer represents a complete solution. (Choose all that apply.)
You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based network. A Cisco switch is configured on the network. You change the original host name of the switch through the hostname command. The prompt displays the changed host name. After some time, power of the switch went off due to some reason. When power restored, you find that the prompt is displaying the old host name.
What is the most likely cause?
Which of the following applications cannot proactively detect anomalies related to a computer?
You have to ensure that your Cisco Router is only accessible via telnet and ssh from the following hosts and subnets:
10.10.2.103
10.10.0.0/24
Which of the following sets of commands will you use to accomplish the task?
Which of the following responsibilities does not come under the audit process?
Each correct answer represents a complete solution. (Choose all that apply.)
A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.
Which of the following tools works as a firewall for the Linux 2.4 kernel?
Which of the following group management messages is used by routers to handle the IPv6 multicast routing?
Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?
You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world.
What tool would you use to accomplish this?
Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?
Cyber Security | GPPA Questions Answers | GPPA Test Prep | GIAC Certified Perimeter Protection Analyst Questions PDF | GPPA Online Exam | GPPA Practice Test | GPPA PDF | GPPA Test Questions | GPPA Study Material | GPPA Exam Preparation | GPPA Valid Dumps | GPPA Real Questions | Cyber Security GPPA Exam Questions