Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISP Premium Access

View all detail and faqs for the GISP exam


772 Students Passed

96% Average Score

94% Same Questions
Viewing page 12 out of 14 pages
Viewing questions 166-180 out of questions
Questions # 166:

Which of the following statements about smurf is true?

Options:

A.

It is an ICMP attack that involves spoofing and flooding.

B.

It is a UDP attack that involves spoofing and flooding.

C.

It is a denial of service (DoS) attack that leaves TCP ports open.

D.

It is an attack with IP fragments that cannot be reassembled.

Questions # 167:

Which of the following techniques are used to secure wireless networks?

Each correct answer represents a complete solution. Choose three.

Options:

A.

MAC address filtering

B.

SSID spoofing

C.

IP spoofing

D.

Closed network

Questions # 168:

Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?

Options:

A.

Spoofing

B.

PING attack

C.

SYN attack

D.

Hacking

Questions # 169:

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

PGP

B.

IPSec

C.

TLS

D.

S/MIME

Questions # 170:

Which of the following rate systems of the Orange book has no security controls?

Options:

A.

C-rated

B.

D-rated

C.

A-rated

D.

E-rated

Questions # 171:

Which of the following statements about service pack are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a medium by which product updates are distributed.

B.

It is a term used for securing an operating system.

C.

It is a term generally related to security problems in a software.

D.

It is a collection of Fixes and Patches in a single product.

Questions # 172:

Which of the following types of halon is found in portable extinguishers and is stored as a liquid?

Options:

A.

Halon 11

B.

Halon 1301

C.

Halon 1211

D.

Halon-f

Questions # 173:

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided laptops to its sales team members. You have configured access points in the network to enable a wireless network. The company's security policy states that all users using laptops must use smart cards for authentication. Which of the following authentication techniques will you use to implement the security policy of the company?

Options:

A.

IEEE 802.1X using EAP-TLS

B.

Pre-shared key

C.

IEEE 802.1X using PEAP-MS-CHAP

D.

Open system

Questions # 174:

Which of the following database types is a collection of tables that are linked by their primary keys?

Options:

A.

Relational database management system

B.

Object-oriented database management system

C.

Hierarchical database management system

D.

File-oriented database management system

Questions # 175:

Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?

Options:

A.

Type II

B.

Type I

C.

Type III

D.

Type IV

Questions # 176:

Which of the following types of attacks is only intended to make a computer resource unavailable to its users?

Options:

A.

Teardrop attack

B.

Denial of Service attack

C.

Land attack

D.

Replay attack

Questions # 177:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:

A.

RPC

B.

IDLE

C.

UDP

D.

TCP SYN/ACK

Questions # 178:

You work as a Network Administrator for Net World International. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. There are ten Sales Managers in the company. The company has recently provided laptops to all its Sales Managers. All the laptops run Windows XP Professional. These laptops will be connected to the company's network through wireless connections. The company's management wants to implement Shared Key authentication for these laptops. When you try to configure the network interface card of one of the laptops for Shared Key authentication, you find no such option. What will you do to enable Shared Key authentication?

Options:

A.

Install PEAP-MS-CHAP v2.

B.

Install Service Pack 1.

C.

Enable WEP.

D.

Install EAP-TLS.

Questions # 179:

Which of the following layers of the OSI model provides end-to-end service?

Options:

A.

The physical layer

B.

The application layer

C.

The session layer

D.

The transport layer

Questions # 180:

Which of the following are the application layer protocols for security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Secure Hypertext Transfer Protocol (S-HTTP)

B.

Secure Sockets Layer (SSL)

C.

Secure Electronic Transaction (SET)

D.

Secure Shell (SSH)

Viewing page 12 out of 14 pages
Viewing questions 166-180 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.