GIAC GISP - GIAC Information Security Professional
Which of the following encryption algorithms are based on stream ciphers?
Each correct answer represents a complete solution. Choose two.
Which of the following classes of IP addresses allows a maximum of 2,097,152 networks?
On which of the following OSI model layers does IPSec operate?
Which of the following protocols implements VPN using IPSec?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?
Which of the following protocols is responsible for the resolution of IP addresses to media access control (MAC) addresses?
You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer's log:
45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72
Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?
Which of the following is the main reason for implementing CCTV as part of the physical arrangement?
Which of the following refers to a condition in which a computer repeatedly sends ICMP echo requests to another host?
Fill in the blank with the appropriate value.
International Data Encryption Algorithm (IDEA) operates on 64-bit blocks using a ________ -bit key.
Which of the following ensures that a sender cannot deny sending a message?
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails.
Which of the following will you use to accomplish this?
Which of the following statements about RSA algorithm are true?
Each correct answer represents a complete solution. Choose two.
Which of the following are the primary components of a discretionary access control (DAC) model?
Each correct answer represents a complete solution. Choose two.
Which of the following is executed when a predetermined event occurs?
