Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GISP - GIAC Information Security Professional

Page: 7 / 14
Total 659 questions

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

A.

HTTP

B.

SSL

C.

SNMP

D.

TLS

Which of the following statements about biometric authentication is true?

A.

A user provides his user name and password for authentication.

B.

A user uses a smart card for authentication.

C.

A sensor scans some physical characteristics of a user and sends that information to the authentication server.

D.

A user is issued a device that is used for authentication.

Which of the following is used for secure financial transactions over the Internet?

A.

VPN

B.

ATM

C.

SSL

D.

SET

Which of the following classes of fire comes under Class C fire?

A.

Combustible metals fire

B.

Paper or wood fire

C.

Oil fire

D.

Electronic or computer fire

Which of the following protocols provides maintenance and error reporting function?

A.

ICMP

B.

IGMP

C.

PPP

D.

UDP

Which of the following is a program that monitors data packets traveling across a network?

A.

Sniffer

B.

Smurf

C.

Hacker

D.

BitLocker

In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?

A.

Remote dial-up network

B.

Remote network

C.

Stolen equipment

D.

Local network

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?

A.

Microsoft Point-to-Point Encryption (MPPE)

B.

Pretty Good Privacy (PGP)

C.

Data Encryption Standard (DES)

D.

IP Security (IPSec)

Fill in the blank with the appropriate value.

SHA-1 produces a _________ -bit message digest.

A.

160

Which of the following is the default port for TACACS?

A.

UDP port 49

B.

TCP port 443

C.

TCP port 25

D.

TCP port 80

Which of the following methods can be helpful to eliminate social engineering threat?

Each correct answer represents a complete solution. Choose three.

A.

Password policies

B.

Vulnerability assessments

C.

Data classification

D.

Data encryption

Which of the following statements about asymmetric encryption are true?

Each correct answer represents a complete solution. Choose two.

A.

Asymmetric encryption uses a public key and a private key pair for data encryption.

B.

Asymmetric encryption is faster as compared to symmetric encryption.

C.

In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.

D.

In asymmetric encryption, only one key is needed to encrypt and decrypt data.

Which of the following types of activities can be audited for security?

Each correct answer represents a complete solution. Choose three.

A.

Data downloading from the Internet

B.

File and object access

C.

Network logons and logoffs

D.

Printer access

Fill in the blanks with the appropriate values.

International Data Encryption Algorithm (IDEA) is a ______ -bit block cipher that uses a _____-bit key.

A.

64,128

Which of the following statements about a perimeter network are true?

Each correct answer represents a complete solution. Choose three.

A.

It has a connection to the Internet through an external firewall and a connection to an internal network through an interior firewall.

B.

It has a connection to a private network through an external firewall and a connection to an internal network through an interior firewall.

C.

It is also known as a demilitarized zone or DMZ.

D.

It prevents access to the internal corporate network for outside users.