Want to pass your GIAC Certified Perimeter Protection Analyst (GPPA) GPPA exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
Which of the following applications cannot proactively detect anomalies related to a computer?
A. NIDS
B. HIDS
C. Anti-virus scanner
D. Firewall installed on the computer
Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address?
A. Circuit-level gateway
B. Application gateway
C. Proxy server
D. Packet Filtering
John works as the Security Manager for PassGuide Inc. He wants to create the Profiler database that
stores information about the network activity at Layer 3, Layer 4, and Layer 7.
Which of the following will he use to accomplish the task?
Each correct answer represents a complete solution. (Choose all that apply.)
A. Protocol contexts
B. Ignore connection
C. Session creation
D. Session teardown