GIAC GISP - GIAC Information Security Professional
Which of the following terms ensures that no intentional or unintentional unauthorized modification is made to data?
Which of the following types of attacks occurs when an unauthorized person obtains passwords and other information from the packets that are traveling between two hosts by using an intermediary program?
Which of the following languages is a fourth-generation language?
Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true?
Each correct answer represents a complete solution. Choose two.
Which of the following is referred to as Radio Frequency Interference (RFI) and Electromagnetic Interference (EMI)?
Which of the following hardware devices prevents broadcasts from crossing over subnets?
Which of the following ports is the default port for IMAP4 protocol?
Which of the following statements about the authentication concept of information security management is true?
Which of the following is a link-state routing protocol?
Which of the following are the responsibilities of the custodian of data?
Each correct answer represents a complete solution. Choose two.
Which of the following provides the best protection against a man-in-the-middle attack?
Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?
Which of the following refers to a program that allows access to a system by skipping the security checks?
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?
