Questions for the GPPA were updated on : Nov 21 ,2025
Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small-sized
packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack
signatures of such attacks.
Which of the following tools can be used to perform session splicing attacks?
Each correct answer represents a complete solution. (Choose all that apply.)
C,D
Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an
immediate router advertisement, instead of waiting for the next scheduled advertisement?
C
You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-
Fi enterprise network against the wireless snooping attacks.
Which of the following measures will you take over the site network devices of the network?
A
Which of the following statements is true about ICMP packets?
Each correct answer represents a complete solution. (Choose all that apply.)
B,C,D
Which of the following describes the term inside global in NAT configuration?
D
Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a remote
location and a public IPv4 address, instead of public IPv6 address, has been assigned to the
computer?
A
An organization has a TCP/IP based network. It uses IPv6 addressing in its network. IPv6 tackles
addressing and routing-table problems, and improves the protocol as well.
Which of the following statements is true about IPv6?
B
Jony works as the Security Manager in ABC Inc. He wants to protect his network from a variant of the
Denial-of-Service (DoS) attack. When the rulebase is enabled for protection, the IDP engine checks
the traffic that exceeds the traffic thresholds.
Which of the following rulebases is used for this purpose?
D
Which of the following methods is a behavior-based IDS detection method?
D
You run the tcpdump command line utility and get a report produced by tcpdump.
What information does this report include?
Each correct answer represents a complete solution. (Choose three.)
A,B,D
As a professional hacker, you want to crack the security of secureserver.com. For this, in the
information gathering step, you performed scanning with the help of nmap utility to retrieve as
many different protocols as possible being used by the secureserver.com so that you could get the
accurate knowledge about what services were being used by the secure server.com.
Which of the following nmap switches have you used to accomplish the task?
D
A firewall is a combination of hardware and software, used to provide security to a network. It is
used to protect an internal network or intranet against unauthorized access from the Internet or
other outside networks. It restricts inbound and outbound access and can analyze all traffic between
an internal network and the Internet. Users can configure a firewall to pass or block packets from
specific IP addresses and ports.
Which of the following tools works as a firewall for the Linux 2.4 kernel?
D
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008
Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the
network run Windows Server 2008. The users in the network use NetBIOS name to connect network
application on the network. You have migrated the network to IPv6-enabled network. Now you want
to enable DNS Server to perform lookups in GlobalNames Zone.
Which of the following commands will you use to accomplish the task?
C
You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution
issue. You ping your ISP's DNS server address and find that the server is down. You want to
continuously ping the DNS address until you have stopped the command.
Which of the following commands will you use?
B
In which of the following CAATs (Computer Assisted Auditing Techniques) does an auditor perform
tests on computer files and databases?
C