Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISP Premium Access

View all detail and faqs for the GISP exam


772 Students Passed

96% Average Score

94% Same Questions
Viewing page 4 out of 14 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

Options:

A.

Spoofing

B.

System hardening

C.

Shielding

D.

Auditing

Questions # 47:

Which of the following components come under the network layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Firewalls

B.

Hub

C.

Routers

D.

MAC addresses

Questions # 48:

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

21

B.

443

C.

80

D.

22

Questions # 49:

Which of the following services are provided by Remote Authentication Dial-In User Service (RADIUS)?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Authentication

B.

Data encryption

C.

Authorization

D.

Accounting

Questions # 50:

Which of the following is not a level of military data-classification system?

Options:

A.

Unclassified

B.

Normal

C.

Confidential

D.

Top secret

Questions # 51:

Fill in the blank with the appropriate value.

Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.

Options:

A.

32

Questions # 52:

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

Options:

A.

Implement a proxy server on the network.

B.

Implement firewall on the network.

C.

Connect a router to the network.

D.

Connect a brouter to the network.

Questions # 53:

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

PGP

B.

TLS

C.

IPSec

D.

S/MIME

Questions # 54:

On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?

Options:

A.

Session layer

B.

Transport layer

C.

Application layer

D.

Data-link layer

Questions # 55:

Which of the following ports is used by a BOOTP server?

Options:

A.

UDP port 389

B.

UDP port 67

C.

TCP port 80

D.

TCP port 110

Questions # 56:

Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

Options:

A.

Snooping

B.

Phishing

C.

SYN attack

D.

Spoofing

Questions # 57:

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.

Options:

A.

transport

Questions # 58:

Which of the following port numbers is used by the HTTPS protocol for secure Web transmission?

Options:

A.

8080

B.

21

C.

110

D.

443

E.

80

F.

25

Questions # 59:

The _______ protocol allows applications to communicate across a network in a way designed to prevent eavesdropping and message forgery.

Options:

A.

PPP

B.

TCP

C.

EAP

D.

TLS

Questions # 60:

Which of the following is not a level of military data-classification system?

Options:

A.

Unclassified

B.

Normal

C.

Confidential

D.

Top secret

Viewing page 4 out of 14 pages
Viewing questions 46-60 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.