GIAC GISP - GIAC Information Security Professional
Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?
Against which of the following does SSH provide protection?
Each correct answer represents a complete solution. Choose two.
Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?
Which of the following techniques are used to secure wireless networks?
Each correct answer represents a complete solution. Choose three.
Which of the following is the best way of protecting important data against virus attack?
Which of the following statements about Due Care policy is true?
Mark the list that mentions the correct levels of classification of the military data-classification system.
Which of the following is a remote access protocol that supports encryption?
Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?
Which of the following statements about smurf is true?
Which of the following standards is used in wireless local area networks (WLANs)?
Fill in the blank with the appropriate term.
A ___________ is a digital representation of information that identifies authorized users on the Internet and intranets.
Which of the following categories of UTP cable has maximum data transfer rate of 155 Mbps?
Which of the following statements about Diffie-Hellman encryption are true?
Each correct answer represents a complete solution. Choose two.
Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?
