Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GISP - GIAC Information Security Professional

Page: 5 / 14
Total 659 questions

Which of the following terms ensures that no intentional or unintentional unauthorized modification is made to data?

A.

Non-repudiation

B.

Confidentiality

C.

Authentication

D.

Integrity

Which of the following types of attacks occurs when an unauthorized person obtains passwords and other information from the packets that are traveling between two hosts by using an intermediary program?

A.

Denial-of-Service attack

B.

Man-in-the-middle attack

C.

Password guessing attack

D.

Dictionary attack

Which of the following languages is a fourth-generation language?

A.

FORTRAN

B.

Assembly

C.

C+

D.

SQL

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true?

Each correct answer represents a complete solution. Choose two.

A.

It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.

B.

It uses TCP port 80 as the default port.

C.

It uses TCP port 443 as the default port.

D.

It is a protocol used to provide security for a database server in an internal network.

Which of the following is referred to as Radio Frequency Interference (RFI) and Electromagnetic Interference (EMI)?

A.

Spike

B.

Brownout

C.

Electrical line noise

D.

Transient

Which of the following hardware devices prevents broadcasts from crossing over subnets?

A.

Bridge

B.

Router

C.

Modem

D.

Hub

Which of the following ports is the default port for IMAP4 protocol?

A.

TCP port 25

B.

TCP port 143

C.

TCP port 80

D.

TCP port 443

Which of the following statements about the authentication concept of information security management is true?

A.

It ensures the reliable and timely access to resources.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.

D.

It establishes the users' identity and ensures that the users are who they say they are.

Which of the following is a link-state routing protocol?

A.

IGRP

B.

RIP v2

C.

RIP v1

D.

OSPF

Which of the following are the responsibilities of the custodian of data?

Each correct answer represents a complete solution. Choose two.

A.

Security of data

B.

User authentication

C.

Maintaining integrity of data

D.

Backing up data

Which of the following provides the best protection against a man-in-the-middle attack?

A.

Strong encryption

B.

Fiber-optic cable

C.

Strong password

D.

Firewall

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

A.

Spoofing

B.

System hardening

C.

Shielding

D.

Auditing

Which of the following refers to a program that allows access to a system by skipping the security checks?

A.

Honey pot

B.

Hoax

C.

Back door

D.

Worm

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

A.

Patent

B.

Snooping

C.

Copyright

D.

Utility model

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

A.

Privacy law

B.

Trademark law

C.

Security law

D.

Copyright law