Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISP Premium Access

View all detail and faqs for the GISP exam


772 Students Passed

96% Average Score

94% Same Questions
Viewing page 8 out of 14 pages
Viewing questions 106-120 out of questions
Questions # 106:

Which of the following books deals with confidentiality?

Options:

A.

Brown Book

B.

Red Book

C.

Purple Book

D.

Orange Book

Questions # 107:

Which of the following ports is the default port for IMAP4 protocol?

Options:

A.

TCP port 25

B.

TCP port 143

C.

TCP port 80

D.

TCP port 443

Questions # 108:

You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NTFS gives better file security than FAT16 and FAT32.

B.

NTFS file system supports for larger hard disks.

C.

NTFS give improved disk compression than FAT16 and FAT32.

D.

Automatic backup.

Questions # 109:

Which of the following statements about the availability concept of Information security management is true?

Options:

A.

It ensures that modifications are not made to data by unauthorized personnel or processes.

B.

It determines actions and behaviors of a single individual within a system.

C.

It ensures reliable and timely access to resources.

D.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.

Questions # 110:

Which of the following are the examples of technical controls?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Auditing

B.

System access

C.

Data backups

D.

Network acchitecture

Questions # 111:

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.

Options:

A.

Blackbox testing

B.

Port redirection

C.

Firewalking

D.

Brainstorming

Questions # 112:

Fill in the blanks with the appropriate values.

Twofish symmetric algorithm operates on _______ -bit blocks and can support a key length of up to ________ bits.

Options:

A.

128,256

Questions # 113:

Which of the following refers to a program that allows access to a system by skipping the security checks?

Options:

A.

Honey pot

B.

Hoax

C.

Back door

D.

Worm

Questions # 114:

Which of the following handles a relatively wide range of frequencies, which may be divided into channels or frequency bins?

Options:

A.

Broadband transmission

B.

Multicast transmission

C.

Baseband transmission

D.

Unicast transmission

Questions # 115:

Which of the following are the levels of military data classification system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Top Secret

B.

Sensitive

C.

Public

D.

Unclassified

E.

Secret

F.

Confidential

Questions # 116:

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.

You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open?

Each correct answer represents a complete solution. Choose two.

Options:

A.

20

B.

80

C.

110

D.

25

Questions # 117:

Which of the following terms is synonymous with the willful destruction of another person's property?

Options:

A.

Hacking

B.

Vandalism

C.

Spoofing

D.

Phishing

Questions # 118:

Which of the following protocols is used to send e-mails on the Internet?

Options:

A.

HTTP

B.

POP3

C.

IMAP4

D.

SMTP

Questions # 119:

How many layers does the TCP/IP model consist of?

Options:

A.

Seven

B.

Four

C.

Six

D.

Five

Questions # 120:

Which of the following protocols provides functionalities for advanced management associated with the use of digital certificates such as certificate issuance, exchange, and revocation?

Options:

A.

Hypertext Transfer Protocol Secure (HTTPS)

B.

Certificate Management Protocol (CMP)

C.

Extensible Authentication Protocol-Transport Level Security (EAP-TLS)

D.

Certificate Enrollment Protocol (CEP)

Viewing page 8 out of 14 pages
Viewing questions 106-120 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.