Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISP Premium Access

View all detail and faqs for the GISP exam


772 Students Passed

96% Average Score

94% Same Questions
Viewing page 6 out of 14 pages
Viewing questions 76-90 out of questions
Questions # 76:

Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?

Options:

A.

Single Loss Expectancy x Annualized Rate of Occurrence

B.

ALE before implementing safeguard + ALE after implementing safeguard + annual cost of safeguard

C.

ALE before implementing safeguard - ALE after implementing safeguard - annual cost of safeguar

D.

Asset Value x Exposure factor

Questions # 77:

Which of the following protocols is used to establish a secure TELNET session over TCP/IP?

Options:

A.

PGP

B.

SSH

C.

SSL

D.

IPSEC

Questions # 78:

Which of the following methods of authentication uses finger prints to identify users?

Options:

A.

Biometrics

B.

PKI

C.

Kerberos

D.

Mutual authentication

Questions # 79:

Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?

Options:

A.

National Institute of Standards and Technology (NIST)

B.

Request for Comments (RFC)

C.

Central Security Service (CSS)

D.

National Security Agency (NSA)

E.

American Bankers Association

F.

International Telecommunications Union

Questions # 80:

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

Options:

A.

Brute force attack

B.

Spoofing

C.

PING attack

D.

SYN attack

Questions # 81:

Which of the following file systems provides file-level security?

Options:

A.

CDFS

B.

FAT

C.

NTFS

D.

FAT32

Questions # 82:

Which of the following entities are directly involved in Secure Electronic Transaction (SET)?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Merchant

B.

Credit card issuer

C.

Payment gateway

D.

Credit card holder

Questions # 83:

Which of the following tools or services is used to find the entire IP address range used by an organization?

Options:

A.

TRACERT

B.

Ping Scanner

C.

PATHPING

D.

Share Scanner

Questions # 84:

Which of the following types of fiber optic cable is generally used in WANs and powered by laser light?

Options:

A.

Multi-mode fiber

B.

Single-mode fiber

C.

Dual-mode fiber

D.

Duplex-mode fiber

Questions # 85:

Which of the following OSI model layers handles addressing and routing?

Options:

A.

Session

B.

Physical

C.

Network

D.

Application

Questions # 86:

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Options:

A.

Patent

B.

Snooping

C.

Copyright

D.

Utility model

Questions # 87:

Which of the following provides protection against network eavesdropping and signal interference and works at the physical layer?

Options:

A.

IPSec protocol

B.

Router

C.

Switch

D.

Shielded twisted pair (STP)

Questions # 88:

Which of the following attributes are used by Lightweight Directory Access Protocol (LDAP) to notify the names of active directory elements?

Each correct answer represents a complete solution. Choose three.

Options:

A.

DC

B.

OU

C.

FN

D.

CN

Questions # 89:

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

Options:

A.

Wiretapping

B.

Spoofing

C.

Data diddling

D.

Eavesdropping

Questions # 90:

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

•It displays the signal strength of a wireless network, MAC address, SISD, channel details, etc.

•It is commonly used for the following purposes:

a. War driving

b. Detecting unauthorized access points

c. Detecting causes of interference on a WLAN

d. WEP ICV error tracking

e. Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

Options:

A.

Kismet

B.

NetStumbler

C.

Absinthe

D.

THC-Scan

Viewing page 6 out of 14 pages
Viewing questions 76-90 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.