GIAC GISP - GIAC Information Security Professional
Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?
Which of the following involves identifying and minimizing the effect of risks?
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.
A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Brutus is a password cracking tool that can be used to crack the following authentications:
•HTTP (Basic Authentication)
•HTTP (HTML Form/CGI)
•POP3 (Post Office Protocol v3)
•FTP (File Transfer Protocol)
•SMB (Server Message Block)
•Telnet
Which of the following attacks can be performed by Brutus for password cracking?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?
Which of the following are the major tasks of risk management?
Each correct answer represents a complete solution. Choose two.
Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?
Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are politically motivated threats that an organization faces?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following hashing algorithms produces a variable length hash value?
Key escrow is a method of __________.
How many keys are used to encrypt data in symmetric encryption?
Which of the following statements about the bridge are true?
Each correct answer represents a complete solution. Choose two.
Which of the following ports is used by the control connection on the FTP server?