Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISF - GIAC Information Security Fundamentals

Page: 10 / 10
Total 333 questions

Which of the following are application layer protocols of Internet protocol (IP) suite?

Each correct answer represents a complete solution. Choose two.

A.

IGP

B.

IGRP

C.

Telnet

D.

SMTP

Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Address Resolution Protocol (ARP)

B.

Network Link Protocol (NWLink)

C.

User Datagram Protocol (UDP)

D.

Internet Control Message Protocol (ICMP)

Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

A.

Privacy

B.

Availability

C.

Integrity

D.

Confidentiality

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

A.

Containment

B.

Preparation

C.

Recovery

D.

Identification

Which of the following books is used to examine integrity and availability?

A.

Brown Book

B.

Red Book

C.

Purple Book

D.

Orange Book

Which of the following protocols can help you get notified in case a router on a network fails?

A.

SMTP

B.

SNMP

C.

TCP

D.

ARP

Which of the following protocols work at the Network layer of the OSI model?

A.

Internet Group Management Protocol (IGMP)

B.

Simple Network Management Protocol (SNMP)

C.

Routing Information Protocol (RIP)

D.

File Transfer Protocol (FTP)

Which of the following statements are true about Dsniff?

Each correct answer represents a complete solution. Choose two.

A.

It is a virus.

B.

It contains Trojans.

C.

It is antivirus.

D.

It is a collection of various hacking tools.

Which of the following tools are used to determine the hop counts of an IP packet?

Each correct answer represents a complete solution. Choose two.

A.

Netstat

B.

Ping

C.

TRACERT

D.

IPCONFIG