GIAC Certified Perimeter Protection Analyst Exam Practice Test

Page: 1 / 14
Total 285 questions
Question 1

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks.

Which of the following measures will you take over the site network devices of the network?



Answer : A


Question 2

Which of the following statements is true about ICMP packets?

Each correct answer represents a complete solution. (Choose all that apply.)



Answer : B, C, D


Question 3

Which of the following describes the term inside global in NAT configuration?



Answer : D


Question 4

Which of the following Linux file systems is a journaled file system?



Answer : A


Question 5

Which of the following number ranges is used for the IPX Standard ACL?



Answer : B


Question 6

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?



Answer : B


Question 7

You work as a Network Security Administrator for NetPerfect Inc. The company has a Windowsbased network. You are in charge of the data and network security of the company. While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential dat

a.

What type of threat is this?



Answer : D


Page:    1 / 14   
Total 285 questions