Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISP - GIAC Information Security Professional

Page: 12 / 14
Total 659 questions

Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?

A.

National Institute of Standards and Technology (NIST)

B.

Request for Comments (RFC)

C.

Central Security Service (CSS)

D.

National Security Agency (NSA)

E.

American Bankers Association

F.

International Telecommunications Union

Which of the following is an international treaty that governs intellectual property?

A.

The Paris Convention

B.

The Washington Convention

C.

The Beijing Convention

D.

The Dalai Lama convention

E.

The London Convention

Which of the following activities is used to take place after recording and registering an incident?

A.

Restoring

B.

Matching

C.

Analysis

D.

Classification

Which of the following protocols is used with a tunneling protocol to provide security?

A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Which of the following encryption strengths is used to secure NTLM version 2 passwords?

A.

56-bit

B.

32-bit

C.

128-bit

D.

64-bit

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

A.

21

B.

443

C.

80

D.

22

Which of the following should propose applicable and effective security controls for managing the risks?

A.

Risk assessment

B.

Risk treatment plan

C.

Risk communication

D.

Risk management plan

Which of the following IP addresses are private addresses?

Each correct answer represents a complete solution. Choose all that apply.

A.

10.0.0.3

B.

192.168.15.2

C.

192.166.54.32

D.

19.3.22.17

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

A.

Building Risk free systems

B.

Risk control

C.

Risk identification

D.

Assuring the integrity of organizational data

Which of the following tools can be used by a user to hide his identity?

Each correct answer represents a complete solution. Choose all that apply.

A.

War dialer

B.

IPchains

C.

Anonymizer

D.

Proxy server

E.

Rootkit

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

A.

Biometrics

B.

Anonymous

C.

Mutual

D.

Multi-factor

Which of the following protocols is used to establish a secure TELNET session over TCP/IP?

A.

PGP

B.

SSH

C.

SSL

D.

IPSEC

How many voice channels are available in a T2 line?

A.

1

B.

10

C.

24

D.

34

Which of the following encryption methods comes under symmetric encryption algorithm?

Each correct answer represents a complete solution. Choose three.

A.

Blowfish

B.

DES

C.

Diffie-Hellman

D.

RC5

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser 's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?

A.

The site's Web server has heavy traffic.

B.

WINS server has no NetBIOS name entry for the server.

C.

DNS entry is not available for the host name.

D.

The site's Web server is offline.