IT認証試験問題集
毎月、GOWUKAKUは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / GPPA 問題集  / GPPA 問題練習

GIAC GPPA 問題練習

GIAC Certified Perimeter Protection Analyst 試験

最新更新時間: 2024/03/19,合計285問。

【2024年3月キャンペーン】:GPPA 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、GPPA 問題集を使用してください。

 / 4

Question No : 1
Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

正解:

Question No : 2
An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network.
Which of the following processes does an IDS perform? Each correct answer represents a complete solution. (Choose all that apply.)

正解:

Question No : 3
Which of the following vulnerability scanners is used to test Web servers for dangerous files/CGIs, outdated server software, and other problems?

正解:

Question No : 4
At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

正解:

Question No : 5
You work as a Network Administrator for ABC Inc. The company has a TCP/IP-based network. A Cisco switch is configured on the network. You change the original host name of the switch through the hostname command. The prompt displays the changed host name. After some time, power of the switch went off due to some reason. When power restored, you find that the prompt is displaying the old host name.
What is the most likely cause?

正解:

Question No : 6
Which of the following protocols is used by voice over IP (VoIP) applications?

正解:

Question No : 7
Jain works as a contract Ethical Hacker. He has recently got a project to do security checking for www.abc.com. He wants to find out the operating system of the ABC server in the information gathering step.
Which of the following commands will he use to accomplish the task? Each correct answer represents a complete solution. (Choose two.)

正解:

Question No : 8
Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?

正解:

Question No : 9
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. He is using a tool to crack the wireless encryption keys.
The description of the tool is as follows:
It is a Unix-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Chipertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.
Which of the following tools is John using to crack the wireless encryption keys?

正解:

Question No : 10
An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner.
Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?

正解:

Question No : 11
You work as a Network Troubleshooter for ABC Inc. You want to tunnel the IPv6 traffic across an IPv4 supporting portion of the company's network.
You are using the interface configuration mode for the tunnel.
Which of the following IP addresses will you enter after the tunnel source command?

正解:

Question No : 12
Which of the following actions can be taken as the countermeasures against the ARP spoofing attack? Each correct answer represents a complete solution. (Choose all that apply.)

正解:

Question No : 13
Which of the following tools is used to analyze the files produced by several popular packetcapture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

正解:

Question No : 14
10.0.0/24
Which of the following sets of commands will you use to accomplish the task?

正解:

Question No : 15
Which of the following well-known ports is used by BOOTP?

正解:

 / 4
GIAC