Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISP Practice Exam with Questions & Answers | Set: 13

Questions 181

Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?

Options:
A.

HTTPS

B.

PPTP

C.

L2TP

D.

SMTP

GIAC GISP Premium Access
Questions 182

Which of the following is used by attackers to record everything a person types, including usernames, passwords, and account information?

Options:
A.

Packet sniffing

B.

Spoofing

C.

Wiretapping

D.

Keystroke logging

Questions 183

Which of the following languages is a fourth-generation language?

Options:
A.

FORTRAN

B.

Assembly

C.

C+

D.

SQL

Questions 184

Which of the following entities are directly involved in Secure Electronic Transaction (SET)?

Each correct answer represents a complete solution. Choose three.

Options:
A.

Merchant

B.

Credit card issuer

C.

Payment gateway

D.

Credit card holder

Questions 185

Which of the following types of safes can be chosen by an organization to store data backups or other types of valuables?

Each correct answer represents a complete solution. Choose three.

Options:
A.

Depositaries

B.

Chests

C.

Bottle safe

D.

Wall safe

Questions 186

Which of the following types of fiber optic cable is generally used in WANs and powered by laser light?

Options:
A.

Multi-mode fiber

B.

Single-mode fiber

C.

Dual-mode fiber

D.

Duplex-mode fiber

Questions 187

Which of the following is a documentation of guidelines that are used to create archival copies of important data?

Options:
A.

Backup policy

B.

Security policy

C.

User policy

D.

Audit policy

Questions 188

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

Options:
A.

RAID-5

B.

RAID-0

C.

RAID-4

D.

RAID-3

E.

RAID-1

Questions 189

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true?

Each correct answer represents a complete solution. Choose two.

Options:
A.

It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.

B.

It uses TCP port 80 as the default port.

C.

It uses TCP port 443 as the default port.

D.

It is a protocol used to provide security for a database server in an internal network.

Questions 190

Which of the following layers are the sub layers of the data-link layer?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Media Access Control (MAC)

B.

Logical Link Control (LLC)

C.

Reserve Address Resolution Protocol (RARP)

D.

Serial Line Internet Protocol (SLIP)

Questions 191

Which of the following statements about System Access Control List (SACL) is true?

Options:
A.

It exists for each and every permission entry assigned to any object.

B.

It is a mechanism for reducing the need for globally unique IP addresses.

C.

It contains a list of both users and groups and whatever permissions they have.

D.

It contains a list of any events that are set to audit for that particular object.

Questions 192

Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

Options:
A.

Port Address Translation (PAT)

B.

Dynamic NAT

C.

Static NAT

D.

Cache NAT

Questions 193

Which of the following are default ports for the FTP service?

Each correct answer represents a complete solution. Choose two.

Options:
A.

443

B.

20

C.

21

D.

80

Questions 194

Which of the following is the most common method used by attackers to identify wireless networks?

Options:
A.

Back door

B.

Packet filtering

C.

Packet sniffing

D.

War driving

Questions 195

In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

Options:
A.

ARP spoofing

B.

Replay

C.

Brute force

D.

MAC duplicating

GIAC Related Exams

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.