Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISP - GIAC Information Security Professional

Page: 13 / 14
Total 659 questions

Which of the following needs to be documented to preserve evidences for presentation in court?

A.

Chain of custody

B.

Incident response policy

C.

Account lockout policy

D.

Separation of duties

A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.

A.

Man-in-the-middle

B.

Brute force

C.

Denial of Service (DoS)

D.

Dictionary

Identify whether the given statement is true or false.

"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

A.

False

B.

True

Which of the following tabs will you click in the Internet Options dialog box to include a websites as a trusted site?

A.

Security

B.

Privacy

C.

Content

D.

General

Which of the following statements about a brute force attack is true?

A.

It is a virus that attacks the hard drive of a computer.

B.

It is a program that allows access to a computer without using security checks.

C.

It is an attack in which someone accesses your e-mail server and sends misleading information to others.

D.

It is a type of spoofing attack.

E.

It is an attempt by an attacker to guess passwords until he succeeds.

Which of the following is used by the Diffie-Hellman encryption algorithm?

A.

Password

B.

Access control entry

C.

Key exchange

D.

Access control list

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.

A.

transport

Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?

A.

64-bit

B.

16-bit

C.

32-bit

D.

128-bit

A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.

A.

Man-in-the-middle

B.

Brute force

C.

Denial of Service (DoS)

D.

Dictionary

Which of the following is a source port forwarder and redirector tool?

A.

Fpipe

B.

NMAP

C.

SuperScan

D.

NSLOOKUP

Which of the following types of virus is capable of changing its signature to avoid detection?

A.

Stealth virus

B.

Boot sector virus

C.

Macro virus

D.

Polymorphic virus

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

A.

Brute force attack

B.

Spoofing

C.

PING attack

D.

SYN attack

In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

A.

ARP spoofing

B.

Replay

C.

Brute force

D.

MAC duplicating

Fill in the blank with the appropriate value.

Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.

A.

32

__________ is the process of verifying the identity of a user and obtaining required evidences from the user.

A.

Verification

B.

Impersonation

C.

Authentication

D.

Authorization