Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GISP - GIAC Information Security Professional

Page: 6 / 14
Total 659 questions

Which of the following entities are directly involved in Secure Electronic Transaction (SET)?

Each correct answer represents a complete solution. Choose three.

A.

Merchant

B.

Credit card issuer

C.

Payment gateway

D.

Credit card holder

Which of the following statements about a certificate is true?

A.

A certificate is a method of encryption used to send mails.

B.

A certificate is used to protect intranets against virus attacks.

C.

A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.

D.

A certificate is a digital representation of information that identifies unauthorized communication packets on the Internet and intranets.

Which of the following should be implemented to protect an organization from spam?

A.

Packet filtering

B.

Auditing

C.

System hardening

D.

E-mail filtering

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

A.

FTP server

B.

VPN

C.

Certificate server

D.

Microsoft Internet Information Server (IIS)

Which of the following protocols allows Cisco devices to acquire and utilize digital certificates from Certification Authorities (CAs)?

A.

Extensible Authentication Protocol (EAP)

B.

Certificate Management Protocol (CMP)

C.

Hypertext Transfer Protocol (HTTP)

D.

Certificate Enrollment Protocol (CEP)

Which of the following are man-made threats that an organization faces?

Each correct answer represents a complete solution. Choose three.

A.

Frauds

B.

Strikes

C.

Employee errors

D.

Theft

You work as a Network Administrator for Net Perfect Inc. The company has a Windows 2000, TCP/IP-based class C network consisting of 200 hosts. The network uses private IP addressing. A computer on the network is connected to the Internet. The management plans to increase the number of hosts to 300. The management also wants all hosts to be able to access the Internet through the existing connection. Which of the following steps will you take to accomplish this?

Each correct answer represents a part of the solution. Choose two.

A.

Implement NAT.

B.

Upgrade your class C network to a class B network.

C.

Add a router to your network.

D.

Add a bridge to your network.

E.

Apply for more IP addresses for your LAN.

Fill in the blanks with the appropriate values.

International Data Encryption Algorithm (IDEA) is a _____ -bit block cipher that uses a ________-bit key.

A.

64,128

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

A.

Employees

B.

Hackers

C.

Visitors

D.

Customers

Which of the following statements about buffer overflow are true?

Each correct answer represents a complete solution. Choose two.

A.

It is a situation that occurs when a storage device runs out of space.

B.

It can terminate an application.

C.

It can improve application performance.

D.

It is a situation that occurs when an application receives more data than it is configured to accept

Which of the following services does Internet Information Server (IIS) provide along with HTTP?

Each correct answer represents a complete solution. Choose three.

A.

SMTP

B.

FTP

C.

PPTP

D.

NNTP

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

A.

Bridge

B.

Antivirus software

C.

Gateway

D.

Firewall

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

A.

Packaging

B.

Spoofing

C.

Eavesdropping

D.

Shielding

You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

A.

HTTP

B.

FTP

C.

Firewall

D.

Gopher

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company.

To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

A.

Email spoofing

B.

Social engineering

C.

Web ripping

D.

Steganography