Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISP - GIAC Information Security Professional

Page: 8 / 14
Total 659 questions

Which of the following encryption algorithms are based on stream ciphers?

Each correct answer represents a complete solution. Choose two.

A.

RC4

B.

FISH

C.

Blowfish

D.

Twofish

Which of the following classes of IP addresses allows a maximum of 2,097,152 networks?

A.

Class C

B.

Class B

C.

Class D

D.

Class A

On which of the following OSI model layers does IPSec operate?

A.

Data-link layer

B.

Physical layer

C.

Session layer

D.

Network layer

Which of the following protocols implements VPN using IPSec?

A.

PPP

B.

L2TP

C.

PPTP

D.

SLIP

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?

A.

HTTPS

B.

HTTP

C.

TELNET

D.

NetBIOS

Which of the following protocols is responsible for the resolution of IP addresses to media access control (MAC) addresses?

A.

ARP

B.

PPP

C.

ICMP

D.

HTTP

You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer's log:

45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72

Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?

A.

16, ICMP

B.

41, TCP

C.

16, UDP

D.

41, UDP

Which of the following is the main reason for implementing CCTV as part of the physical arrangement?

A.

Authenticating users

B.

Securing data

C.

Increasing guard visibility

D.

Preventing criminal activities

Which of the following refers to a condition in which a computer repeatedly sends ICMP echo requests to another host?

A.

Broadcast storm

B.

SYN attack

C.

Spoofing

D.

PING attack

Fill in the blank with the appropriate value.

International Data Encryption Algorithm (IDEA) operates on 64-bit blocks using a ________ -bit key.

A.

128

Which of the following ensures that a sender cannot deny sending a message?

A.

Authentication

B.

Snooping

C.

Spoofing

D.

Non repudiation

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails.

Which of the following will you use to accomplish this?

A.

IPSec

B.

PGP

C.

PPTP

D.

NTFS

Which of the following statements about RSA algorithm are true?

Each correct answer represents a complete solution. Choose two.

A.

It is a block cipher in which plain text and cipher text are integers between 0 and n-1.

B.

It is a stream cipher in which plain text and cipher text are integers between 0 and n-1.

C.

It is an asymmetric algorithm.

D.

It is a symmetric algorithm.

Which of the following are the primary components of a discretionary access control (DAC) model?

Each correct answer represents a complete solution. Choose two.

A.

User's group

B.

Access rights and permissions

C.

File and data ownership

D.

Smart card

Which of the following is executed when a predetermined event occurs?

A.

Worm

B.

Trojan horse

C.

Logic bomb

D.

MAC