GIAC GISF - GIAC Information Security Fundamentals
Which of the following are application layer protocols of Internet protocol (IP) suite?
Each correct answer represents a complete solution. Choose two.
Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following concepts represent the three fundamental principles of information security?
Each correct answer represents a complete solution. Choose three.
You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?
Which of the following books is used to examine integrity and availability?
Which of the following protocols can help you get notified in case a router on a network fails?
Which of the following protocols work at the Network layer of the OSI model?
Which of the following statements are true about Dsniff?
Each correct answer represents a complete solution. Choose two.
Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.
