Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISP - GIAC Information Security Professional

Page: 10 / 14
Total 659 questions

Which of the following statements about Switched Multimegabit Data Service (SMDS) are true?

Each correct answer represents a complete solution. Choose two.

A.

It is a logical connection between two devices.

B.

It uses fixed-length (53-byte) packets to transmit information.

C.

It supports speeds of 1.544 Mbps over Digital Signal level 1 (DS-1) transmission facilities.

D.

It is a high-speed WAN networking technology used for communication over public data networks

Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?

A.

Proxy server

B.

Security

C.

Cookies

D.

Certificate

Which of the following statements about Network Address Translation (NAT) are true?

Each correct answer represents a complete solution. Choose two.

A.

It allows the computers in a private network to share a global, ISP assigned address to connect to the Internet.

B.

It reduces the need for globally unique IP addresses.

C.

It allows external network clients access to internal services.

D.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

Which of the following protocols is used to query and modify information stored within the directory services?

A.

PPTP

B.

ARP

C.

PAP

D.

LDAP

Fill in the blank with the appropriate layer name.

The Network layer of the OSI model corresponds to the _______________ layer of the TCP/IP model.

A.

Internet

Which of the following attacks involves multiple compromised systems to attack a single target?

A.

Brute force attack

B.

DDoS attack

C.

Dictionary attack

D.

Replay attack

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

A.

Cross site scripting

B.

Man-in-the-middle attack

C.

Cookie poisoning

D.

Computer-based social engineering

Which of the following are the responsibilities of the owner with regard to data in an information classification program?

Each correct answer represents a complete solution. Choose three.

A.

Delegating the responsibility of the data protection duties to a custodian.

B.

Determining what level of classification the information requires.

C.

Running regular backups and routinely testing the validity of the backup data.

D.

Reviewing the classification assignments at regular time intervals and making changes as the business needs change.

Which of the following protocols work at the data-link layer?

Each correct answer represents a complete solution. Choose two.

A.

NFS

B.

SSL

C.

ARP

D.

PPP

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser 's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?

A.

The site's Web server has heavy traffic.

B.

The site's Web server is offline.

C.

WINS server has no NetBIOS name entry for the server.

D.

DNS entry is not available for the host name.

Which of the following are the benefits of information classification for an organization?

A.

It helps identify which information is the most sensitive or vital to an organization.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.

It helps identify which protections apply to which information.

D.

It helps reduce the Total Cost of Ownership (TCO).

These are false reports about non-existent viruses. In these reports, the writer often claims to do impossible things. Due to these false reports, the network administrator shuts down his network, which in turn affects the work of the company. These reports falsely claim to describe an extremely dangerous virus, and declare that the report is issued by a reputed company. These reports are known as __________.

A.

Time bombs

B.

Virus hoaxes

C.

Chain letters

D.

Spambots

E.

Logic bombs

Which of the following cables provides maximum security against electronic eavesdropping on a network?

A.

Fibre optic cable

B.

NTP cable

C.

STP cable

D.

UTP cable

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

A.

Piggybacking

B.

Hacking

C.

Session hijacking

D.

Keystroke logging

Which of the following statements about role-based access control (RBAC) model is true?

A.

In this model, a user can access resources according to his role in the organization.

B.

In this model, the permissions are uniquely assigned to each user account.

C.

In this model, the same permission is assigned to each user account.

D.

In this model, the users can access resources according to their seniority.