Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISP Premium Access

View all detail and faqs for the GISP exam


772 Students Passed

96% Average Score

94% Same Questions
Viewing page 7 out of 14 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

The server can optionally authenticate the client.

B.

The client always authenticates the server.

C.

The server always authenticates the client.

D.

The client can optionally authenticate the server.

Questions # 92:

Which of the following books is used to examine integrity and availability?

Options:

A.

Brown Book

B.

Purple Book

C.

Orange Book

D.

Red Book

Questions # 93:

Which of the following are threats to network security?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Dial-up connections

B.

Rogue employees

C.

Disabled user accounts

D.

Events auditing

Questions # 94:

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Corroborating

B.

Circumstantial

C.

Direct

D.

Incontrovertible

Questions # 95:

Which of the following tools can be used to perform tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing?

Options:

A.

Obiwan

B.

Cain

C.

L0phtcrack

D.

John the Ripper

Questions # 96:

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Technical

B.

Administrative

C.

Automatic

D.

Physical

Questions # 97:

Which of the following is a term used to refer to access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?

Options:

A.

Mail bombing

B.

Piggybacking

C.

Spoofing

D.

Snooping

Questions # 98:

Which of the following should be implemented to protect an organization from spam?

Options:

A.

Packet filtering

B.

Auditing

C.

System hardening

D.

E-mail filtering

Questions # 99:

Samantha works as an Ethical Hacker for we-are-secure Inc. She wants to test the security of the weare- secure server for DoS attacks. She sends large number of ICMP ECHO packets to the target computer. Which of the following DoS attacking techniques will she use to accomplish the task?

Options:

A.

Land attack

B.

Ping flood attack

C.

Smurf dos attack

D.

Teardrop attack

Questions # 100:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Options:

A.

PsList

B.

Cain

C.

Fpipe

D.

PsExec

Questions # 101:

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance

B.

Spam

C.

Dumpster diving

D.

Encapsulation

Questions # 102:

Which of the following encryption algorithms are based on symmetric key cryptographic algorithms?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

RC5

B.

AES

C.

DSA

D.

Blowfish

E.

IDEA

Questions # 103:

Which of the following safes are large enough to allow a person to enter?

Options:

A.

Wall safes

B.

Floor safes

C.

Vaults

D.

Chests

Questions # 104:

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.

Privacy law

B.

Trademark law

C.

Security law

D.

Copyright law

Questions # 105:

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

WEP uses the RC4 encryption algorithm.

B.

The Initialization Vector (IV) field of WEP is only 24 bits long.

C.

Automated tools such as AirSnort are available for discovering WEP keys.

D.

It provides better security than the Wi-Fi Protected Access protocol.

Viewing page 7 out of 14 pages
Viewing questions 91-105 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.