giac GPPA Exam Questions

Questions for the GPPA were updated on : Nov 21 ,2025

Page 1 out of 19. Viewing questions 1-15 out of 285

Question 1

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small-sized
packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack
signatures of such attacks.
Which of the following tools can be used to perform session splicing attacks?
Each correct answer represents a complete solution. (Choose all that apply.)

  • A. Y.A.T.
  • B. Fragroute
  • C. Whisker
  • D. Nessus
Answer:

C,D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following ICMPv6 neighbor discovery messages is sent by hosts to request an
immediate router advertisement, instead of waiting for the next scheduled advertisement?

  • A. Neighbor Advertisement
  • B. Neighbor Solicitation
  • C. Router Solicitation
  • D. Router Advertisement
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-
Fi enterprise network against the wireless snooping attacks.
Which of the following measures will you take over the site network devices of the network?

  • A. Disable the SSID broadcast feature of the router.
  • B. Apply firewalls at appropriate spots.
  • C. Download and install new firmware patch for the router.
  • D. Apply a standard ACL on the router.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which of the following statements is true about ICMP packets?
Each correct answer represents a complete solution. (Choose all that apply.)

  • A. They guarantee the delivery of datagrams.
  • B. They are used to report errors if a problem in IP processing occurs.
  • C. The PING utility uses them to verify connectivity between two hosts.
  • D. They are encapsulated within IP datagrams.
  • E. They use UDP datagrams.
Answer:

B,C,D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 5

Which of the following describes the term inside global in NAT configuration?

  • A. It is a local MAC address assigned to a host in a private network.
  • B. It is the data that comes inside a local network from an external host.
  • C. It is a local IP address assigned to a host in a private network.
  • D. It is the registered (public) IP address that represents the inside hosts in private network to the outside network.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following IPv6 transition technologies is used by the DirectAccess if a user is in a remote
location and a public IPv4 address, instead of public IPv6 address, has been assigned to the
computer?

  • A. 6to4
  • B. PortProxy
  • C. Teredo
  • D. ISATAP
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

An organization has a TCP/IP based network. It uses IPv6 addressing in its network. IPv6 tackles
addressing and routing-table problems, and improves the protocol as well.
Which of the following statements is true about IPv6?

  • A. It implements broadcasting.
  • B. It eliminates the primary need for Network Address Translation (NAT).
  • C. It uses symmetric key encryption.
  • D. Its address is 32 bits in length.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Jony works as the Security Manager in ABC Inc. He wants to protect his network from a variant of the
Denial-of-Service (DoS) attack. When the rulebase is enabled for protection, the IDP engine checks
the traffic that exceeds the traffic thresholds.
Which of the following rulebases is used for this purpose?

  • A. Traffic Anomalies rulebase
  • B. Backdoor rulebase
  • C. Exempt rulebase
  • D. SYN Protector rulebase
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following methods is a behavior-based IDS detection method?

  • A. Pattern matching detection
  • B. Protocol detection
  • C. Knowledge-based detection
  • D. Statistical anomaly detection
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

You run the tcpdump command line utility and get a report produced by tcpdump.
What information does this report include?
Each correct answer represents a complete solution. (Choose three.)

  • A. Packets captured
  • B. Packets dropped by kernel
  • C. Packets discarded
  • D. Packets received by filter
Answer:

A,B,D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

As a professional hacker, you want to crack the security of secureserver.com. For this, in the
information gathering step, you performed scanning with the help of nmap utility to retrieve as
many different protocols as possible being used by the secureserver.com so that you could get the
accurate knowledge about what services were being used by the secure server.com.
Which of the following nmap switches have you used to accomplish the task?

  • A. nmap -sS
  • B. nmap -sT
  • C. nmap -vO
  • D. nmap -sO
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

A firewall is a combination of hardware and software, used to provide security to a network. It is
used to protect an internal network or intranet against unauthorized access from the Internet or
other outside networks. It restricts inbound and outbound access and can analyze all traffic between
an internal network and the Internet. Users can configure a firewall to pass or block packets from
specific IP addresses and ports.
Which of the following tools works as a firewall for the Linux 2.4 kernel?

  • A. OpenSSH
  • B. IPChains
  • C. Stunnel
  • D. IPTables
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008
Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the
network run Windows Server 2008. The users in the network use NetBIOS name to connect network
application on the network. You have migrated the network to IPv6-enabled network. Now you want
to enable DNS Server to perform lookups in GlobalNames Zone.
Which of the following commands will you use to accomplish the task?

  • A. Dnscmd <server name> /config /enableglobalnames 1
  • B. Dnscmd <server name> /config /globalnamesqueryorder 0
  • C. Dnscmd <server name> /config /enableglobalnamessupport 1
  • D. Dnscmd <server name> /config /enableglobalnamessupport 0
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution
issue. You ping your ISP's DNS server address and find that the server is down. You want to
continuously ping the DNS address until you have stopped the command.
Which of the following commands will you use?

  • A. ping -l
  • B. ping -t
  • C. ping -a
  • D. ping -n
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

In which of the following CAATs (Computer Assisted Auditing Techniques) does an auditor perform
tests on computer files and databases?

  • A. Parallel Simulation
  • B. Custom Audit Software (CAS)
  • C. Generalized Audit Software (GAS)
  • D. Test Data
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2