Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISP Practice Exam with Questions & Answers | Set: 4

Questions 46

Which of the following is a reason to implement security logging on a DNS server?

Options:
A.

For measuring a DNS server's performance

B.

For recording the number of queries resolved

C.

For preventing malware attacks on a DNS server

D.

For monitoring unauthorized zone transfer

GIAC GISP Premium Access
Questions 47

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Worm

B.

Biometrics

C.

Denial-of-Service (DoS)

D.

Trojan horse

Questions 48

Which of the following is ensured by the concept of availability in information system security?

Options:
A.

Data modifications are not made by an unauthorized user or process.

B.

The intentional or unintentional unauthorized disclosure of a message or important document contents is prevented.

C.

The systems are up and running when they are needed.

D.

Unauthorized modifications are not made by authorized users.

Questions 49

Which of the following is a program that monitors data packets traveling across a network?

Options:
A.

Sniffer

B.

Smurf

C.

Hacker

D.

BitLocker

Questions 50

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Data service

B.

Account service

C.

Ticket-granting service

D.

Authentication service

Questions 51

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?

Options:
A.

HTTPS

B.

HTTP

C.

TELNET

D.

NetBIOS

Questions 52

Which of the following are the goals of the cryptographic systems?

Each correct answer represents a complete solution. Choose three.

Options:
A.

Availability

B.

Authentication

C.

Integrity

D.

Confidentiality

Questions 53

Which of the following is used for secure financial transactions over the Internet?

Options:
A.

VPN

B.

ATM

C.

SSL

D.

SET

Questions 54

Which of the following protocols provides maintenance and error reporting function?

Options:
A.

ICMP

B.

IGMP

C.

PPP

D.

UDP

Questions 55

Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

Options:
A.

Sanitization

B.

Cryptography

C.

Hardening

D.

Authentication

Questions 56

Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?

Options:
A.

Denial-of-Service (DoS) attack

B.

Impersonation attack

C.

Vulnerability attack

D.

Man-in-the-middle attack

Questions 57

Mark works as a Webmaster for Infonet Inc. He sets up an e-commerce site. He wants to accept online payments through credit cards on this site. He wants the credit card numbers to be encrypted. What will Mark do to accomplish the task?

Options:
A.

Use PGP.

B.

Use HTTP.

C.

Use MIME.

D.

Use SET.

Questions 58

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company.

To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:
A.

Email spoofing

B.

Social engineering

C.

Web ripping

D.

Steganography

Questions 59

You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?

Options:
A.

Only users within the company.

B.

Anyone can authenticate.

C.

Only users with the correct WEP key.

D.

Only the administrator.

Questions 60

Which of the following protocols work at the Network layer of the OSI model?

Options:
A.

Routing Information Protocol (RIP)

B.

Internet Group Management Protocol (IGMP)

C.

Simple Network Management Protocol (SNMP)

D.

File Transfer Protocol (FTP)

GIAC Related Exams

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.