Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISP Premium Access

View all detail and faqs for the GISP exam


772 Students Passed

96% Average Score

94% Same Questions
Viewing page 9 out of 14 pages
Viewing questions 121-135 out of questions
Questions # 121:

You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

Options:

A.

HTTP

B.

FTP

C.

Firewall

D.

Gopher

Questions # 122:

Fill in the blank with the appropriate value.

International Data Encryption Algorithm (IDEA) operates on 64-bit blocks using a ________ -bit key.

Options:

A.

128

Questions # 123:

Which of the following protocols uses TCP port 22 as the default port and operates at the application layer?

Options:

A.

Secure Sockets Layer (SSL)

B.

Secure Shell (SSH)

C.

Post Office Protocol version 3 (POP3)

D.

Trivial File Transfer Protocol (TFTP)

Questions # 124:

Which of the following statements about RSA algorithm are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a block cipher in which plain text and cipher text are integers between 0 and n-1.

B.

It is a stream cipher in which plain text and cipher text are integers between 0 and n-1.

C.

It is an asymmetric algorithm.

D.

It is a symmetric algorithm.

Questions # 125:

Which of the following ports is used by a BOOTP server?

Options:

A.

UDP port 389

B.

UDP port 67

C.

TCP port 80

D.

TCP port 110

Questions # 126:

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

21

B.

443

C.

80

D.

22

Questions # 127:

Which of the following types of activities can be audited for security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Data downloading from the Internet

B.

File and object access

C.

Network logons and logoffs

D.

Printer access

Questions # 128:

You work as a Network Administrator for Net Perfect Inc. The company has a Windows 2000, TCP/IP-based class C network consisting of 200 hosts. The network uses private IP addressing. A computer on the network is connected to the Internet. The management plans to increase the number of hosts to 300. The management also wants all hosts to be able to access the Internet through the existing connection. Which of the following steps will you take to accomplish this?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Implement NAT.

B.

Upgrade your class C network to a class B network.

C.

Add a router to your network.

D.

Add a bridge to your network.

E.

Apply for more IP addresses for your LAN.

Questions # 129:

Which of the following tools is used for breaking digital watermark?

Options:

A.

TRACERT

B.

Trin00

C.

Fpipe

D.

2Mosaic

Questions # 130:

Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?

Options:

A.

Denial-of-Service (DoS) attack

B.

Impersonation attack

C.

Vulnerability attack

D.

Man-in-the-middle attack

Questions # 131:

Which of the following components come under the physical layer of the OSI model?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Wall jacks

B.

Hubs

C.

Switches

D.

Fiber cabling

E.

RJ-45 connectors

Questions # 132:

Which of the following processes is known as Declassification?

Options:

A.

Verifying the identity of a person, network host, or system process.

B.

Physically destroying the media and the information stored on it.

C.

Assessing the risk involved in making a confidential document available to public.

D.

Removing the content from the media so that it is difficult to restore.

Questions # 133:

Which of the following devices performs protocol and format translations?

Options:

A.

Switch

B.

Modem

C.

Gateway

D.

Repeater

Questions # 134:

Which of the following are the common roles with regard to data in an information classification program?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

User

B.

Owner

C.

Custodian

D.

Security auditor

E.

Editor

Questions # 135:

Which of the following IP addresses are private addresses?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

10.0.0.3

B.

192.168.15.2

C.

192.166.54.32

D.

19.3.22.17

Viewing page 9 out of 14 pages
Viewing questions 121-135 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.