Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISP Practice Exam with Questions & Answers | Set: 10

Questions 136

Which of the following have been developed to address security issues in the e-commerce system?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Digital cash

B.

Encryption frameworks

C.

Shopping cart

D.

Digital signatures

GIAC GISP Premium Access
Questions 137

In which of the following attacks does an attacker send a spoofed TCP SYN packet in which the target's IP address is filled in both the source and destination fields?

Options:
A.

Jolt DoS attack

B.

Ping of death attack

C.

Teardrop attack

D.

Land attack

Questions 138

Which of the following statements about smurf is true?

Options:
A.

It is an ICMP attack that involves spoofing and flooding.

B.

It is a UDP attack that involves spoofing and flooding.

C.

It is a denial of service (DoS) attack that leaves TCP ports open.

D.

It is an attack with IP fragments that cannot be reassembled.

Questions 139

You work as a Network Administrator for Infonet Inc. The company's network has an FTP server.

You want to secure the server so that only authorized users can access it. What will you do to accomplish this?

Options:
A.

Stop the FTP service on the server.

B.

Disable anonymous authentication.

C.

Disable the network adapter on the server.

D.

Enable anonymous authentication.

Questions 140

Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?

Options:
A.

Sam Spade

B.

NIDS

C.

ACL

D.

Cookies

Questions 141

Which of the following authentication methods support mutual authentication?

Each correct answer represents a complete solution. Choose two.

Options:
A.

MS-CHAP v2

B.

EAP-TLS

C.

EAP-MD5

D.

NTLM

Questions 142

Which of the following are the application layer protocols for security?

Each correct answer represents a complete solution. Choose three.

Options:
A.

Secure Hypertext Transfer Protocol (S-HTTP)

B.

Secure Sockets Layer (SSL)

C.

Secure Electronic Transaction (SET)

D.

Secure Shell (SSH)

Questions 143

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Options:
A.

PGP

B.

IPSec

C.

TLS

D.

S/MIME

Questions 144

Which of the following are the differences between PPTP and L2TP?

Each correct answer represents a complete solution. Choose three.

Options:
A.

L2TP does not provide any kind of security.

B.

PPTP connections use Microsoft Point-to-Point Encryption (MPPE), whereas L2TP uses Data Encryption Standard (DES).

C.

L2TP may be used with IPSec, while PPTP stands alone.

D.

PPTP is supported by most industry vendors, while L2TP is a proprietary Microsoft standard.

Questions 145

Which of the following heights of fence deters only casual trespassers?

Options:
A.

3 to 4 feet

B.

2 to 2.5 feet

C.

8 feet

D.

6 to 7 feet

Questions 146

Which of the following access control models are used in the commercial sector?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Clark-Wilson model

B.

Clark-Biba model

C.

Bell-LaPadula model

D.

Biba model

Questions 147

You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS). You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish this?

Options:
A.

Copy the files to a network share on a FAT32 volume.

B.

Copy the files to a network share on an NTFS volume.

C.

Place the files in an encrypted folder. Then, copy the folder to a floppy disk.

D.

Copy the files to a floppy disk that has been formatted using Windows 2000 Professional.

Questions 148

Which of the following refers to going through someone's trash to find out useful or confidential information?

Options:
A.

Dumpster diving

B.

Hacking

C.

Phishing

D.

Spoofing

Questions 149

Which of the following attacks involves multiple compromised systems to attack a single target?

Options:
A.

Brute force attack

B.

DDoS attack

C.

Dictionary attack

D.

Replay attack

Questions 150

Which of the following statements about a fiber-optic cable are true?

Each correct answer represents a complete solution. Choose three.

Options:
A.

It is immune to electromagnetic interference (EMI).

B.

It can transmit undistorted signals over great distances.

C.

It has eight wires twisted into four pairs.

D.

It uses light pulses for signal transmission.

GIAC Related Exams

How to pass GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test Exam
How to pass GIAC GCFW - GIAC Certified Firewall Analyst Exam
How to pass GIAC GCPM - GIAC Certified Project Manager Certification Practice Test Exam
How to pass GIAC GISF - GIAC Information Security Fundamentals Exam
How to pass GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET Exam
How to pass GIAC GSSP-Java - GIAC Secure Software Programmer – Java Exam
How to pass GIAC GSSP-NET-CSHARP - GIAC GIAC Secure Software Programmer - C#.NET Exam

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.