Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISP Practice Exam with Questions & Answers | Set: 11

Questions 151

Which of the following terms is used for securing an operating system from an attack?

Options:
A.

System hacking

B.

System hardening

C.

System mirroring

D.

System indexing

GIAC GISP Premium Access
Questions 152

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

The mutation engine of the virus is generating a new encrypted code.

B.

John has changed the signature of the virus.

C.

The virus, used by John, is not in the database of the antivirus program installed on the server.

D.

John has created a new virus.

Questions 153

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

Options:
A.

Rainbow table

B.

Rootkit

C.

Access control list

D.

Backdoor

Questions 154

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:
A.

RPC

B.

IDLE

C.

UDP

D.

TCP SYN/ACK

Questions 155

Which of the following components come under the network layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Firewalls

B.

Hub

C.

Routers

D.

MAC addresses

Questions 156

Which of the following defines the communication link between a Web server and Web applications?

Options:
A.

PGP

B.

CGI

C.

IETF

D.

Firewall

Questions 157

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided laptops to its sales team members. You have configured access points in the network to enable a wireless network. The company's security policy states that all users using laptops must use smart cards for authentication. Which of the following authentication techniques will you use to implement the security policy of the company?

Options:
A.

IEEE 802.1X using EAP-TLS

B.

Pre-shared key

C.

IEEE 802.1X using PEAP-MS-CHAP

D.

Open system

Questions 158

You work as a Network Administrator for Net World International. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. There are ten Sales Managers in the company. The company has recently provided laptops to all its Sales Managers. All the laptops run Windows XP Professional. These laptops will be connected to the company's network through wireless connections. The company's management wants to implement Shared Key authentication for these laptops. When you try to configure the network interface card of one of the laptops for Shared Key authentication, you find no such option. What will you do to enable Shared Key authentication?

Options:
A.

Install PEAP-MS-CHAP v2.

B.

Install Service Pack 1.

C.

Enable WEP.

D.

Install EAP-TLS.

Questions 159

These are false reports about non-existent viruses. In these reports, the writer often claims to do impossible things. Due to these false reports, the network administrator shuts down his network, which in turn affects the work of the company. These reports falsely claim to describe an extremely dangerous virus, and declare that the report is issued by a reputed company. These reports are known as __________.

Options:
A.

Time bombs

B.

Virus hoaxes

C.

Chain letters

D.

Spambots

E.

Logic bombs

Questions 160

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

He should upgrade his antivirus program.

B.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

C.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.

He should restore his Windows settings.

Questions 161

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

Options:
A.

A DNS Zone

B.

An Intranet

C.

A demilitarized zone (DMZ)

D.

A stub zone

Questions 162

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

Options:
A.

It backs up the entire database, including the transaction log.

B.

It is the fastest method of backing up data.

C.

It backs up only the files changed since the most recent backup and clears the archive bit.

D.

It is the slowest method for taking a data backup.

Questions 163

Which of the following layers of the OSI model provides non-repudiation services?

Options:
A.

The application layer

B.

The data-link layer

C.

The presentation layer

D.

The physical layer

Questions 164

How many keys are used to encrypt data in symmetric encryption?

Options:
A.

Two

B.

Three

C.

Four

D.

One

Questions 165

Samantha works as an Ethical Hacker for we-are-secure Inc. She wants to test the security of the weare- secure server for DoS attacks. She sends large number of ICMP ECHO packets to the target computer. Which of the following DoS attacking techniques will she use to accomplish the task?

Options:
A.

Land attack

B.

Ping flood attack

C.

Smurf dos attack

D.

Teardrop attack

GIAC Related Exams

How to pass GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test Exam
How to pass GIAC GCFW - GIAC Certified Firewall Analyst Exam
How to pass GIAC GCPM - GIAC Certified Project Manager Certification Practice Test Exam
How to pass GIAC GISF - GIAC Information Security Fundamentals Exam
How to pass GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET Exam
How to pass GIAC GSSP-Java - GIAC Secure Software Programmer – Java Exam
How to pass GIAC GSSP-NET-CSHARP - GIAC GIAC Secure Software Programmer - C#.NET Exam

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.