GIAC GISP - GIAC Information Security Professional
Which of the following needs to be documented to preserve evidences for presentation in court?
A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.
Identify whether the given statement is true or false.
"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."
Which of the following tabs will you click in the Internet Options dialog box to include a websites as a trusted site?
Which of the following statements about a brute force attack is true?
Which of the following is used by the Diffie-Hellman encryption algorithm?
Fill in the blank with the appropriate layer name of the OSI model.
Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.
Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?
A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.
Which of the following is a source port forwarder and redirector tool?
Which of the following types of virus is capable of changing its signature to avoid detection?
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?
In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?
Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.
__________ is the process of verifying the identity of a user and obtaining required evidences from the user.
