Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISP - GIAC Information Security Professional

Page: 4 / 14
Total 659 questions

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

The NTFS file system should be implemented on a client computer.

C.

Strong encryption software should be used to store credit card information.

D.

Limited and authorized access should be allowed on the stored credit card information.

Which of the following provides protection against network eavesdropping and signal interference and works at the physical layer?

A.

IPSec protocol

B.

Router

C.

Switch

D.

Shielded twisted pair (STP)

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

A.

RAID-5

B.

RAID-0

C.

RAID-4

D.

RAID-3

E.

RAID-1

Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

A.

Port Address Translation (PAT)

B.

Dynamic NAT

C.

Static NAT

D.

Cache NAT

Which of the following statements is true about transient noise?

A.

It is a momentary low voltage condition.

B.

It is a short duration of power line disruption.

C.

It is a prolonged power supply that is below the normal voltage.

D.

It is an electrical current that does not fluctuate.

How long are cookies in effect if no expiration date is set?

A.

Forever

B.

Until the session ends.

C.

Fifteen days

D.

One year

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

A.

It backs up the entire database, including the transaction log.

B.

It is the fastest method of backing up data.

C.

It backs up only the files changed since the most recent backup and clears the archive bit.

D.

It is the slowest method for taking a data backup.

Which of the following are default ports for the FTP service?

Each correct answer represents a complete solution. Choose two.

A.

443

B.

20

C.

21

D.

80

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

A.

Authentication

B.

Non-repudiation

C.

Confidentiality

D.

Integrity

Which of the following is an open source network intrusion detection system?

A.

Sourcefire

B.

NETSH

C.

Macof

D.

Snort

How many layers does the TCP/IP model consist of?

A.

Seven

B.

Four

C.

Six

D.

Five

Which of the following protocols provides functionalities for advanced management associated with the use of digital certificates such as certificate issuance, exchange, and revocation?

A.

Hypertext Transfer Protocol Secure (HTTPS)

B.

Certificate Management Protocol (CMP)

C.

Extensible Authentication Protocol-Transport Level Security (EAP-TLS)

D.

Certificate Enrollment Protocol (CEP)

Which of the following are the types of password guessing attacks?

Each correct answer represents a complete solution. Choose two.

A.

Man-in-the-middle attack

B.

Dictionary attack

C.

Brute force attack

D.

Password attack

Which of the following tools or services is used to find the entire IP address range used by an organization?

A.

TRACERT

B.

Ping Scanner

C.

PATHPING

D.

Share Scanner

Which of the following protocols work at the Session layer of the OSI model?

A.

User Datagram Protocol (UDP)

B.

Trivial File Transfer Protocol (TFTP)

C.

Border Gateway Multicast Protocol (BGMP)

D.

Internet Security Association and Key Management Protocol (ISAKMP)