Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISP Practice Exam with Questions & Answers | Set: 3

Questions 31

Copper cabling comes under the _______ layer of the OSI model.

Options:
A.

Physical

B.

Session

C.

Network

D.

Application

GIAC GISP Premium Access
Questions 32

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:
A.

HTTP

B.

SSL

C.

SNMP

D.

TLS

Questions 33

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Data service

B.

Account service

C.

Authentication service

D.

Ticket-granting service

Questions 34

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

Options:
A.

Rootkit

B.

Backdoor

C.

Access control list

D.

Rainbow table

Questions 35

Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?

Options:
A.

64-bit

B.

16-bit

C.

32-bit

D.

128-bit

Questions 36

International Data Encryption Algorithm (IDEA) is a __________ block cipher.

Options:
A.

32-bit

B.

128-bit

C.

16-bit

D.

64-bit

Questions 37

The TCP/IP protocol suite uses ____ to identify which service a certain packet is destined for.

Options:
A.

MAC addresses

B.

Port numbers

C.

Subnet masks

D.

IP addresses

Questions 38

Which of the following ports is used by a BOOTP server?

Options:
A.

UDP port 389

B.

UDP port 67

C.

TCP port 80

D.

TCP port 110

Questions 39

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

Options:
A.

Technical

B.

Administrative

C.

Automatic

D.

Physical

Questions 40

Which of the following is the most secure method of authentication?

Options:
A.

Biometrics

B.

Username and password

C.

Smart card

D.

Anonymous

Questions 41

You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

Options:
A.

HTTP

B.

FTP

C.

Firewall

D.

Gopher

Questions 42

Which of the following components come under the physical layer of the OSI model?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Wall jacks

B.

Hubs

C.

Switches

D.

Fiber cabling

E.

RJ-45 connectors

Questions 43

Which of the following occurs when a packet is sent from a source computer to a destination computer?

Options:
A.

Broadcast transmission

B.

Unicast transmission

C.

Multicast transmission

D.

Baseband transmission

Questions 44

Which of the following protocols is responsible for the resolution of IP addresses to media access control (MAC) addresses?

Options:
A.

ARP

B.

PPP

C.

ICMP

D.

HTTP

Questions 45

Which of the following are intrusion detection device?

Options:
A.

Fingerprint reader

B.

Smart card reader

C.

Retinal scanner

D.

CCTV

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.