Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISP Premium Access

View all detail and faqs for the GISP exam


772 Students Passed

96% Average Score

94% Same Questions
Viewing page 5 out of 14 pages
Viewing questions 61-75 out of questions
Questions # 61:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:

A.

TCP SYN/ACK

B.

IDLE

C.

UDP

D.

RPC

Questions # 62:

Identify whether the given statement is true or false.

"Availability is a term that refers to the reliable and timely access to data and resources that you are authorized to use."

Options:

A.

False

B.

True

Questions # 63:

Which of the following is a program that monitors data packets traveling across a network?

Options:

A.

Sniffer

B.

Smurf

C.

Hacker

D.

BitLocker

Questions # 64:

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance

B.

Dumpster diving

C.

Encapsulation

D.

Spam

Questions # 65:

Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?

Options:

A.

CHAP

B.

PAP

C.

EAP

D.

MS-CHAP v2

Questions # 66:

Which of the following is the rating for paper or wood fires?

Options:

A.

Class B

B.

Class A

C.

Class D

D.

Class C

Questions # 67:

Fill in the blanks with the appropriate values.

International Data Encryption Algorithm (IDEA) is a _____ -bit block cipher that uses a ________-bit key.

Options:

A.

64,128

Questions # 68:

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Questions # 69:

Which of the following is used by the Diffie-Hellman encryption algorithm?

Options:

A.

Password

B.

Access control entry

C.

Key exchange

D.

Access control list

Questions # 70:

Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?

Options:

A.

Single Loss Expectancy x Annualized Rate of Occurrence

B.

ALE before implementing safeguard + ALE after implementing safeguard + annual cost of safeguard

C.

ALE before implementing safeguard - ALE after implementing safeguard - annual cost of safeguar

D.

Asset Value x Exposure factor

Questions # 71:

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Data service

B.

Account service

C.

Authentication service

D.

Ticket-granting service

Questions # 72:

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Collusion

B.

Phishing

C.

Buffer overflow

D.

Eavesdropping

Questions # 73:

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

Options:

A.

Rootkit

B.

Backdoor

C.

Access control list

D.

Rainbow table

Questions # 74:

The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from children under __ years of age without verifiable permission of a parent?

Options:

A.

15

B.

13

C.

10

D.

21

E.

18

Questions # 75:

Which of the following statements about a brute force attack is true?

Options:

A.

It is a virus that attacks the hard drive of a computer.

B.

It is a program that allows access to a computer without using security checks.

C.

It is an attack in which someone accesses your e-mail server and sends misleading information to others.

D.

It is a type of spoofing attack.

E.

It is an attempt by an attacker to guess passwords until he succeeds.

Viewing page 5 out of 14 pages
Viewing questions 61-75 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.