GIAC GISP - GIAC Information Security Professional
Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?
Which of the following statements about the One Time Password (OTP) security system are true?
Each correct answer represents a complete solution. Choose two.
Which of the following steps can be taken to protect laptops and data they hold?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are ensured by the concept of integrity in information system security?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about Discretionary Access Control List (DACL) is true?
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided laptops to its sales team members. You have configured access points in the network to enable a wireless network. The company's security policy states that all users using laptops must use smart cards for authentication. Which of the following authentication techniques will you use to implement the security policy of the company?
Which of the following standards works at the presentation layer?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of attacks is only intended to make a computer resource unavailable to its users?
Which of the following statements about Digest authentication are true?
Each correct answer represents a complete solution. Choose two.
Which of the following is a technique used to attack an Ethernet wired or wireless network?
Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?
Which of the following are the types of access controls?
Each correct answer represents a complete solution. Choose three.
Which of the following methods of authentication uses finger prints to identify users?
Which of the following terms is used for the process of securing a system or a device on a network infrastructure?
