Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISP - GIAC Information Security Professional

Page: 2 / 14
Total 659 questions

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. While examining a log report, he finds that an intrusion has been attempted by an attacker whose IP address is 0x40.0x3A.0x2B.0xE6. Which of the following decimal IP addresses will respond to the ping on the above Hexadecimal IP address?

A.

64.58.43.230

B.

64.58.43.231

C.

64.59.43.230

D.

64.58.42.230

Which of the following protocols implements VPN using IPSec?

A.

L2TP

B.

SLIP

C.

PPP

D.

PPTP

Which of the following provides the best protection against a man-in-the-middle attack?

A.

Fiber-optic cable

B.

Strong password

C.

Strong encryption

D.

Firewall

Which of the following is not a major concern in traditional business transactions as compare to online transactions?

A.

Bookkeeping

B.

Security

C.

Product Quality

D.

Customer Support

Which of the following defines the communication link between a Web server and Web applications?

A.

Firewall

B.

IETF

C.

CGI

D.

PGP

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

A.

Fraggle

B.

Ping of death

C.

Jolt

D.

Teardrop

An attacker sends a large number of packets to a target computer that causes denial of service. Which of the following type of attacks is this?

A.

Flooding

B.

Snooping

C.

Phishing

D.

Spoofing

You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?

A.

Enable DNS recursive queries on the DNS server.

B.

Disable DNS reverse lookup on the e-mail server.

C.

Enable DNS reverse lookup on the e-mail server.

D.

Disable DNS recursive queries on the DNS server.

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

A.

SNMP

B.

TLS

C.

HTTP

D.

SSL

Which of the following is used by attackers to obtain an authenticated connection on a network?

A.

Back door

B.

Replay attack

C.

Denial-of-Service (DoS) attack

D.

Man-in-the-middle attack

Which of the following is used to repair missing or damaged system files that might prevent Windows from starting correctly?

A.

Boot Repair

B.

System Repair

C.

Recovery Repair

D.

Startup Repair

Which of the following needs to be documented to preserve evidences for presentation in court?

A.

Separation of duties

B.

Account lockout policy

C.

Chain of custody

D.

Incident response policy

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

Snort

B.

SARA

C.

Samhain

D.

Tripwire

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this?

Each correct answer represents a part of the solution. Choose three.

A.

Configure the authentication type for the wireless LAN to Open system.

B.

Broadcast SSID to connect to the access point (AP).

C.

Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

D.

Install a firewall software on each wireless access point.

E.

On each client computer, add the SSID for the wireless LAN as the preferred network.

F.

Configure the authentication type for the wireless LAN to Shared Key.

Which of the following tools is NOT used for logging network activities in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

A.

Timbersee

B.

PsGetSid

C.

PsLoggedOn

D.

Swatch