Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISP Practice Exam with Questions & Answers | Set: 12

Questions 166

Which of the following are the responsibilities of the custodian of data?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Security of data

B.

User authentication

C.

Maintaining integrity of data

D.

Backing up data

GIAC GISP Premium Access
Questions 167

Which of the following terms is synonymous with the willful destruction of another person's property?

Options:
A.

Hacking

B.

Vandalism

C.

Spoofing

D.

Phishing

Questions 168

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Options:
A.

Authentication

B.

Non-repudiation

C.

Confidentiality

D.

Integrity

Questions 169

Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

Options:
A.

IPSec

B.

NAT

C.

Firewall

D.

MAC address

Questions 170

Which of the following protocols is used as the directory access protocol?

Options:
A.

HDAP

B.

NNTP

C.

FTP

D.

LDAP

Questions 171

Which of the following is a link-state routing protocol?

Options:
A.

IGRP

B.

RIP v2

C.

RIP v1

D.

OSPF

Questions 172

Which of the following are the phases of the Certification and Accreditation (C&A) process?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Auditing

B.

Initiation

C.

Detection

D.

Continuous Monitoring

Questions 173

Which of the following provides protection against network eavesdropping and signal interference and works at the physical layer?

Options:
A.

IPSec protocol

B.

Router

C.

Switch

D.

Shielded twisted pair (STP)

Questions 174

Which of the following is a signature-based intrusion detection system (IDS) ?

Options:
A.

StealthWatch

B.

Snort

C.

RealSecure

D.

Tripwire

Questions 175

Which of the following books deals with confidentiality?

Options:
A.

Brown Book

B.

Red Book

C.

Purple Book

D.

Orange Book

Questions 176

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

The NTFS file system should be implemented on a client computer.

C.

Strong encryption software should be used to store credit card information.

D.

Limited and authorized access should be allowed on the stored credit card information.

Questions 177

Which of the following statements about packet filtering is true?

Options:
A.

It is used to store information about confidential data.

B.

It is used to send confidential data on the public network.

C.

It allows or restricts the flow of encrypted packets to provide security.

D.

It allows or restricts the flow of specific types of packets to provide security.

Questions 178

You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

NTFS gives better file security than FAT16 and FAT32.

B.

NTFS file system supports for larger hard disks.

C.

NTFS give improved disk compression than FAT16 and FAT32.

D.

Automatic backup.

Questions 179

Which of the following is used in asymmetric encryption?

Options:
A.

Public key and user key

B.

Public key and private key

C.

SSL

D.

NTFS

Questions 180

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

WEP uses the RC4 encryption algorithm.

B.

The Initialization Vector (IV) field of WEP is only 24 bits long.

C.

Automated tools such as AirSnort are available for discovering WEP keys.

D.

It provides better security than the Wi-Fi Protected Access protocol.

GIAC Related Exams

How to pass GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test Exam
How to pass GIAC GCFW - GIAC Certified Firewall Analyst Exam
How to pass GIAC GCPM - GIAC Certified Project Manager Certification Practice Test Exam
How to pass GIAC GISF - GIAC Information Security Fundamentals Exam
How to pass GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET Exam
How to pass GIAC GSSP-Java - GIAC Secure Software Programmer – Java Exam
How to pass GIAC GSSP-NET-CSHARP - GIAC GIAC Secure Software Programmer - C#.NET Exam

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.