Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISP - GIAC Information Security Professional

Page: 1 / 14
Total 659 questions

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

A.

Tunneling

B.

Spoofing

C.

Packet filtering

D.

Packet sniffing

Which of the following involves identifying and minimizing the effect of risks?

A.

Risk profile

B.

Recovery plan

C.

Risk plan

D.

Risk retention

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

A.

RAID-1

B.

RAID-4

C.

RAID-3

D.

RAID-0

E.

RAID-5

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

A.

Network-based

B.

File-based

C.

Signature-based

D.

Anomaly-based

Brutus is a password cracking tool that can be used to crack the following authentications:

•HTTP (Basic Authentication)

•HTTP (HTML Form/CGI)

•POP3 (Post Office Protocol v3)

•FTP (File Transfer Protocol)

•SMB (Server Message Block)

•Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Brute force attack

C.

Replay attack

D.

Hybrid attack

E.

Man-in-the-middle attack

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

A.

Spoofing

B.

Auditing

C.

Shielding

D.

System hardening

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

A.

Building Risk free systems

B.

Risk control

C.

Risk identification

D.

Assuring the integrity of organizational data

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

A.

Rootkit

B.

Backdoor

C.

Access control list

D.

Rainbow table

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?

Each correct answer represents a complete solution. Choose all that apply.

A.

Password-based authentication

B.

Kerberos authentication

C.

TIS authentication

D.

Rhosts (rsh-style) authentication

Which of the following are politically motivated threats that an organization faces?

Each correct answer represents a complete solution. Choose all that apply.

A.

Power distribution outages

B.

Civil disobedience

C.

Riot

D.

Vandalism

E.

Terrorist attacks

Which of the following hashing algorithms produces a variable length hash value?

A.

MD5

B.

SHA

C.

HAVAL

D.

MD4

Key escrow is a method of __________.

A.

Key renewal

B.

Key distribution

C.

Key recovery

D.

key revocation

How many keys are used to encrypt data in symmetric encryption?

A.

Four

B.

One

C.

Two

D.

Three

Which of the following statements about the bridge are true?

Each correct answer represents a complete solution. Choose two.

A.

It filters traffic based on IP addresses.

B.

It filters traffic based on MAC addresses.

C.

It assigns a different network address per port.

D.

It forwards broadcast packets.

Which of the following ports is used by the control connection on the FTP server?

A.

TCP port 23

B.

TCP port 21

C.

TCP port 53

D.

TCP port 443