Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISP Premium Access

View all detail and faqs for the GISP exam


772 Students Passed

96% Average Score

94% Same Questions
Viewing page 3 out of 14 pages
Viewing questions 31-45 out of questions
Questions # 31:

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

Options:

A.

RAID-1

B.

RAID-4

C.

RAID-3

D.

RAID-0

E.

RAID-5

Questions # 32:

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Building Risk free systems

B.

Risk control

C.

Risk identification

D.

Assuring the integrity of organizational data

Questions # 33:

Which of the following statements about the bridge are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It filters traffic based on IP addresses.

B.

It filters traffic based on MAC addresses.

C.

It assigns a different network address per port.

D.

It forwards broadcast packets.

Questions # 34:

Which of the following are the centralized administration technologies?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

RADIUS

B.

TACACS+

C.

Peer-to-Peer

D.

Media Access control

Questions # 35:

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

Options:

A.

Spoofing

B.

Auditing

C.

Shielding

D.

System hardening

Questions # 36:

Which of the following involves identifying and minimizing the effect of risks?

Options:

A.

Risk profile

B.

Recovery plan

C.

Risk plan

D.

Risk retention

Questions # 37:

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

Options:

A.

Rootkit

B.

Backdoor

C.

Access control list

D.

Rainbow table

Questions # 38:

Which of the following protocols transmits user credentials as plaintext?

Options:

A.

MS-CHAP

B.

PAP

C.

MS-CHAP v2

D.

CHAP

Questions # 39:

Which of the following is not a biometrics technology for authentication?

Options:

A.

Fingerprint

B.

Voiceprint

C.

Facial geometry

D.

User password

Questions # 40:

Which of the following is a duplicate of the original site of an organization, with fully working systems as well as near-complete backups of user data?

Options:

A.

Hot site

B.

Cold site

C.

Data site

D.

Warm site

Questions # 41:

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser 's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?

Options:

A.

The site's Web server has heavy traffic.

B.

WINS server has no NetBIOS name entry for the server.

C.

DNS entry is not available for the host name.

D.

The site's Web server is offline.

Questions # 42:

Which of the following is the most secure method of authentication?

Options:

A.

Biometrics

B.

Username and password

C.

Smart card

D.

Anonymous

Questions # 43:

Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

Options:

A.

Authentication

B.

Sanitization

C.

Hardening

D.

Cryptography

Questions # 44:

Which of the following terms is used for a router that filters traffic before it is passed to the firewall?

Options:

A.

Screened host

B.

Demilitarized zone (DMZ)

C.

Bastion host

D.

Honey pot

Questions # 45:

A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.

Options:

A.

Man-in-the-middle

B.

Brute force

C.

Denial of Service (DoS)

D.

Dictionary

Viewing page 3 out of 14 pages
Viewing questions 31-45 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.