Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISP - GIAC Information Security Professional

Page: 9 / 14
Total 659 questions

Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?

A.

Anti-x

B.

LIDS

C.

Scanlogd

D.

KFSensor

Against which of the following does SSH provide protection?

Each correct answer represents a complete solution. Choose two.

A.

DoS attack

B.

Password sniffing

C.

Broadcast storm

D.

IP spoofing

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

A.

UDP port 1701

B.

UDP port 161

C.

TCP port 443

D.

TCP port 110

Which of the following techniques are used to secure wireless networks?

Each correct answer represents a complete solution. Choose three.

A.

MAC address filtering

B.

SSID spoofing

C.

IP spoofing

D.

Closed network

Which of the following is the best way of protecting important data against virus attack?

A.

Updating the anti-virus software regularly.

B.

Taking daily backup of data.

C.

Using strong passwords to log on to the network.

D.

Implementing a firewall.

Which of the following statements about Due Care policy is true?

A.

It provides information about new viruses.

B.

It is a method used to authenticate users on a network.

C.

It identifies the level of confidentiality of information.

D.

It is a method for securing database servers.

Mark the list that mentions the correct levels of classification of the military data-classification system.

A.

未命名-4

Which of the following is a remote access protocol that supports encryption?

A.

PPP

B.

SNMP

C.

UDP

D.

SLIP

Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?

A.

Terminal service

B.

DFS service

C.

SMTP service

D.

Directory service

Which of the following statements about smurf is true?

A.

It is an ICMP attack that involves spoofing and flooding.

B.

It is a UDP attack that involves spoofing and flooding.

C.

It is a denial of service (DoS) attack that leaves TCP ports open.

D.

It is an attack with IP fragments that cannot be reassembled.

Which of the following standards is used in wireless local area networks (WLANs)?

A.

IEEE 802.4

B.

IEEE 802.11b

C.

IEEE 802.5

D.

IEEE 802.3

Fill in the blank with the appropriate term.

A ___________ is a digital representation of information that identifies authorized users on the Internet and intranets.

A.

certificate

Which of the following categories of UTP cable has maximum data transfer rate of 155 Mbps?

A.

Category 5

B.

Category 3

C.

Category 7

D.

Category 6

Which of the following statements about Diffie-Hellman encryption are true?

Each correct answer represents a complete solution. Choose two.

A.

It uses only a private key.

B.

It uses both a public key and a private key.

C.

It does not authenticate the parties involved.

D.

It was developed in 1976.

Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?

A.

IMAP

B.

SNMP

C.

SMTP

D.

POP3