GIAC GISP - GIAC Information Security Professional
Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.
Which of the following statements about biometric authentication is true?
Which of the following is used for secure financial transactions over the Internet?
Which of the following classes of fire comes under Class C fire?
Which of the following protocols provides maintenance and error reporting function?
Which of the following is a program that monitors data packets traveling across a network?
In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?
Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?
Fill in the blank with the appropriate value.
SHA-1 produces a _________ -bit message digest.
Which of the following is the default port for TACACS?
Which of the following methods can be helpful to eliminate social engineering threat?
Each correct answer represents a complete solution. Choose three.
Which of the following statements about asymmetric encryption are true?
Each correct answer represents a complete solution. Choose two.
Which of the following types of activities can be audited for security?
Each correct answer represents a complete solution. Choose three.
Fill in the blanks with the appropriate values.
International Data Encryption Algorithm (IDEA) is a ______ -bit block cipher that uses a _____-bit key.
Which of the following statements about a perimeter network are true?
Each correct answer represents a complete solution. Choose three.
