GIAC GISP - GIAC Information Security Professional
You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following provides protection against network eavesdropping and signal interference and works at the physical layer?
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.
A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?
Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
Which of the following statements is true about transient noise?
How long are cookies in effect if no expiration date is set?
Which of the following statements about incremental backup are true?
Each correct answer represents a complete solution. Choose two.
Which of the following are default ports for the FTP service?
Each correct answer represents a complete solution. Choose two.
Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?
Which of the following is an open source network intrusion detection system?
How many layers does the TCP/IP model consist of?
Which of the following protocols provides functionalities for advanced management associated with the use of digital certificates such as certificate issuance, exchange, and revocation?
Which of the following are the types of password guessing attacks?
Each correct answer represents a complete solution. Choose two.
Which of the following tools or services is used to find the entire IP address range used by an organization?
Which of the following protocols work at the Session layer of the OSI model?
