Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISP - GIAC Information Security Professional

Page: 3 / 14
Total 659 questions

Which of the following is known as a message digest?

A.

Message authentication code

B.

Hash function

C.

Hashing algorithm

D.

Spider

Which of the following federal laws are related to hacking activities?

Each correct answer represents a complete solution. Choose three.

A.

18 U.S.C. 1030

B.

18 U.S.C. 1028

C.

18 U.S.C. 2510

D.

18 U.S.C. 1029

Which of the following technologies are forms of single sign-on (SSO)?

Each correct answer represents a complete solution. Choose three.

A.

CoSign

B.

Kerberos

C.

RADIUS

D.

SESAME

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

A.

Buffer overflow

B.

Collusion

C.

Phishing

D.

Eavesdropping

Which of the following areas of a network contains DNS servers and Web servers for Internet users?

A.

MMZ

B.

VPN

C.

DMZ

D.

VLAN

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

A.

PGP

B.

Symmetric

C.

S/MIME

D.

Asymmetric

Which of the following should propose applicable and effective security controls for managing the risks?

A.

Risk assessment

B.

Risk treatment plan

C.

Risk communication

D.

Risk management plan

Which of the following statements about Secure Sockets Layer (SSL) are true?

Each correct answer represents a complete solution. Choose two.

A.

It provides communication privacy, authentication, and message integrity.

B.

It provides mail transfer service.

C.

It provides connectivity between Web browser and Web server.

D.

It uses a combination of public key and symmetric encryption for security of data.

Which of the following is not a biometrics technology for authentication?

A.

Fingerprint

B.

Voiceprint

C.

Facial geometry

D.

User password

Mark works as a Network Administrator for We-are-secure Inc. He finds that the We-are-secure server has been infected with a virus. He presents to the company a report that describes the symptoms of the virus. A summary of the report is given below:

This virus has a dual payload, as the first payload of the virus changes the first megabyte of the hard drive to zero. Due to this, the contents of the partition tables are deleted and the computer hangs. The second payload replaces the code of the flash BIOS with garbage values. This virus spreads under the Portable Executable File Format under Windows 95, Windows 98, and Windows ME.

Which of the following viruses has the symptoms as the one described above?

A.

Nimda

B.

Chernobyl

C.

Melissa

D.

I Love You

On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?

A.

Session layer

B.

Transport layer

C.

Application layer

D.

Data-link layer

Which of the following provides protection from attacks at the application layer and prevents unauthorized access and packet spoofing?

A.

Proxy server

B.

IPSec protocol

C.

Network address translation (NAT)

D.

STP cabling

Which of the following protocols is used to retrieve e-mails from a remote mail server?

A.

SNMP

B.

POP3

C.

SMTP

D.

IGMP

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

A.

Wiretapping

B.

Spoofing

C.

Data diddling

D.

Eavesdropping

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

A.

PsList

B.

Cain

C.

Fpipe

D.

PsExec