Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISP Premium Access

View all detail and faqs for the GISP exam


772 Students Passed

96% Average Score

94% Same Questions
Viewing page 13 out of 14 pages
Viewing questions 181-195 out of questions
Questions # 181:

What does the Internet encryption and authentication system named RSA stand for?

Options:

A.

Rivest-Shamir-Adleman

B.

Read System Authority

C.

Rivest-System-Adleman

D.

Remote System Authority

Questions # 182:

Which of the following statements about Digest authentication are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

In Digest authentication, passwords are sent across a network as clear text, rather than as a has value.

B.

Digest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.

C.

In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.

D.

Digest authentication is a more secure authentication method as compared to Basic authentication.

Questions # 183:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The mutation engine of the virus is generating a new encrypted code.

B.

John has changed the signature of the virus.

C.

The virus, used by John, is not in the database of the antivirus program installed on the server.

D.

John has created a new virus.

Questions # 184:

In which of the following scanning techniques does a scanner connect to an FTP server and request that server to start data transfer to the third system?

Options:

A.

Xmas Tree scanning

B.

TCP SYN scanning

C.

Bounce attack scanning

D.

TCP FIN scanning

Questions # 185:

Which of the following terms refers to the act of obtaining plain text from cipher text without a cryptographic key?

Options:

A.

Hacking

B.

Algorithm

C.

Cryptanalysis

D.

Ciphertext

Questions # 186:

Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?

Options:

A.

Challenge Handshake Authentication Protocol (CHAP)

B.

Extensible Authentication Protocol (EAP)

C.

Open Shortest Path First (OSPF)

D.

Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

Questions # 187:

Which of the following categories of UTP cable has maximum data transfer rate of 155 Mbps?

Options:

A.

Category 5

B.

Category 3

C.

Category 7

D.

Category 6

Questions # 188:

You work as a professional Ethical Hacker. You are assigned a project to test the security of www.we-are-secure.com. You are working on the Windows Server 2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use on-screen keyboards and speech-to-text conversion software which can also be useful agains keyloggers, as there are no typing or mouse movements involved.

B.

Remove the SNMP agent or disable the SNMP service.

C.

Use commercially available anti-keyloggers such as PrivacyKeyboard.

D.

Monitor the programs running on the server to see whether any new process is running on the server or not.

Questions # 189:

Which of the following are the responsibilities of the owner with regard to data in an information classification program?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Delegating the responsibility of the data protection duties to a custodian.

B.

Determining what level of classification the information requires.

C.

Running regular backups and routinely testing the validity of the backup data.

D.

Reviewing the classification assignments at regular time intervals and making changes as the business needs change.

Questions # 190:

Fill in the blank with the appropriate value.

Primary Rate Interface (PRI) of an ISDN connection contains _______ B channels and ______ D channel.

Options:

A.

23,1

Questions # 191:

Which of the following components come under the network layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Firewalls

B.

Hub

C.

Routers

D.

MAC addresses

Questions # 192:

Which of the following are tunneling protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

NNTP

B.

SMTP

C.

L2TP

D.

PPTP

Questions # 193:

Which of the following policies is set by a network administrator to allow users to keep their emails and documents for a fixed period of time?

Options:

A.

Retention policy

B.

Password policy

C.

Audit policy

D.

Backup policy

Questions # 194:

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Collusion

B.

Eavesdropping

C.

Buffer overflow

D.

Phishing

Questions # 195:

Which of the following is a name, symbol, or slogan with which a product is identified?

Options:

A.

Trademark

B.

Patent

C.

Trade secret

D.

Copyright

Viewing page 13 out of 14 pages
Viewing questions 181-195 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.