GIAC GISP - GIAC Information Security Professional
Which of the following is known as a message digest?
Which of the following federal laws are related to hacking activities?
Each correct answer represents a complete solution. Choose three.
Which of the following technologies are forms of single sign-on (SSO)?
Each correct answer represents a complete solution. Choose three.
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
Which of the following areas of a network contains DNS servers and Web servers for Internet users?
Which of the following methods of encryption uses a single key to encrypt and decrypt data?
Which of the following should propose applicable and effective security controls for managing the risks?
Which of the following statements about Secure Sockets Layer (SSL) are true?
Each correct answer represents a complete solution. Choose two.
Which of the following is not a biometrics technology for authentication?
Mark works as a Network Administrator for We-are-secure Inc. He finds that the We-are-secure server has been infected with a virus. He presents to the company a report that describes the symptoms of the virus. A summary of the report is given below:
This virus has a dual payload, as the first payload of the virus changes the first megabyte of the hard drive to zero. Due to this, the contents of the partition tables are deleted and the computer hangs. The second payload replaces the code of the flash BIOS with garbage values. This virus spreads under the Portable Executable File Format under Windows 95, Windows 98, and Windows ME.
Which of the following viruses has the symptoms as the one described above?
On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?
Which of the following provides protection from attacks at the application layer and prevents unauthorized access and packet spoofing?
Which of the following protocols is used to retrieve e-mails from a remote mail server?
Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?
