GIAC GISP - GIAC Information Security Professional
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. While examining a log report, he finds that an intrusion has been attempted by an attacker whose IP address is 0x40.0x3A.0x2B.0xE6. Which of the following decimal IP addresses will respond to the ping on the above Hexadecimal IP address?
Which of the following protocols implements VPN using IPSec?
Which of the following provides the best protection against a man-in-the-middle attack?
Which of the following is not a major concern in traditional business transactions as compare to online transactions?
Which of the following defines the communication link between a Web server and Web applications?
In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?
An attacker sends a large number of packets to a target computer that causes denial of service. Which of the following type of attacks is this?
You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?
Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.
Which of the following is used by attackers to obtain an authenticated connection on a network?
Which of the following is used to repair missing or damaged system files that might prevent Windows from starting correctly?
Which of the following needs to be documented to preserve evidences for presentation in court?
John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this?
Each correct answer represents a part of the solution. Choose three.
Which of the following tools is NOT used for logging network activities in the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.
