GIAC GISP - GIAC Information Security Professional
Which of the following entities are directly involved in Secure Electronic Transaction (SET)?
Each correct answer represents a complete solution. Choose three.
Which of the following statements about a certificate is true?
Which of the following should be implemented to protect an organization from spam?
You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?
Which of the following protocols allows Cisco devices to acquire and utilize digital certificates from Certification Authorities (CAs)?
Which of the following are man-made threats that an organization faces?
Each correct answer represents a complete solution. Choose three.
You work as a Network Administrator for Net Perfect Inc. The company has a Windows 2000, TCP/IP-based class C network consisting of 200 hosts. The network uses private IP addressing. A computer on the network is connected to the Internet. The management plans to increase the number of hosts to 300. The management also wants all hosts to be able to access the Internet through the existing connection. Which of the following steps will you take to accomplish this?
Each correct answer represents a part of the solution. Choose two.
Fill in the blanks with the appropriate values.
International Data Encryption Algorithm (IDEA) is a _____ -bit block cipher that uses a ________-bit key.
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
Which of the following statements about buffer overflow are true?
Each correct answer represents a complete solution. Choose two.
Which of the following services does Internet Information Server (IIS) provide along with HTTP?
Each correct answer represents a complete solution. Choose three.
You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?
Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.
You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company.
To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?
