Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISP Practice Exam with Questions & Answers | Set: 5

Questions 61

Fill in the blank with the appropriate value.

SHA-1 produces a _________ -bit message digest.

Options:
A.

160

GIAC GISP Premium Access
Questions 62

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

Options:
A.

Take a full backup daily and use six-tape rotation.

B.

Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.

C.

Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.

D.

Take a full backup daily with the previous night's tape taken offsite.

E.

Take a full backup daily with one tape taken offsite weekly.

F.

Take a full backup on alternate days and keep rotating the tapes.

Questions 63

You work as a Web Administrator for Perfect World Inc. The company is planning to host an Ecommerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it?

Each correct answer represents a part of the solution. Choose two.

Options:
A.

Use the EAP protocol.

B.

Use the SSL protocol.

C.

Use Basic authentication.

D.

Use encrypted authentication.

Questions 64

Which of the following are the goals of risk management?

Each correct answer represents a complete solution. Choose three.

Options:
A.

Identifying the risk

B.

Assessing the impact of potential threats

C.

Finding an economic balance between the impact of the risk and the cost of the countermeasure

D.

Identifying the accused

Questions 65

Which of the following encryption algorithms are based on stream ciphers?

Each correct answer represents a complete solution. Choose two.

Options:
A.

RC4

B.

FISH

C.

Blowfish

D.

Twofish

Questions 66

Which of the following statements about asymmetric encryption are true?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Asymmetric encryption uses a public key and a private key pair for data encryption.

B.

Asymmetric encryption is faster as compared to symmetric encryption.

C.

In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.

D.

In asymmetric encryption, only one key is needed to encrypt and decrypt data.

Questions 67

Which of the following is a process of monitoring data packets that travel across a network?

Options:
A.

Packet sniffing

B.

Packet filtering

C.

Shielding

D.

Password guessing

Questions 68

Which of the following are the common roles with regard to data in an information classification program?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

User

B.

Owner

C.

Custodian

D.

Security auditor

E.

Editor

Questions 69

Which of the following statements about RSA algorithm are true?

Each correct answer represents a complete solution. Choose two.

Options:
A.

It is a block cipher in which plain text and cipher text are integers between 0 and n-1.

B.

It is a stream cipher in which plain text and cipher text are integers between 0 and n-1.

C.

It is an asymmetric algorithm.

D.

It is a symmetric algorithm.

Questions 70

Which of the following statements about IEEE 802.1X standard are true?

Each correct answer represents a complete solution. Choose two.

Options:
A.

It uses the Point-to-Point Tunneling Protocol (PPTP) that works on Ethernet, Token Ring, or wireless LANs to exchange messages for the authentication process.

B.

It uses the Extensible Authentication Protocol (EAP) that works on Ethernet, Token Ring, or wireless LANs to exchange messages for the authentication process.

C.

It provides an authentication framework for wireless LANs.

D.

It provides the highest level of VPN security.

Questions 71

Which of the following statements about system hardening are true?

Each correct answer represents a complete solution. Choose two.

Options:
A.

It is used for securing the computer hardware.

B.

It can be achieved by locking the computer room.

C.

It is used for securing an operating system.

D.

It can be achieved by installing service packs and security updates on a regular basis.

Questions 72

You work as a Network Administrator for Net Perfect Inc. The company has a Windows 2000, TCP/IP-based class C network consisting of 200 hosts. The network uses private IP addressing. A computer on the network is connected to the Internet. The management plans to increase the number of hosts to 300. The management also wants all hosts to be able to access the Internet through the existing connection. Which of the following steps will you take to accomplish this?

Each correct answer represents a part of the solution. Choose two.

Options:
A.

Implement NAT.

B.

Upgrade your class C network to a class B network.

C.

Add a router to your network.

D.

Add a bridge to your network.

E.

Apply for more IP addresses for your LAN.

Questions 73

Which of the following processes is known as Declassification?

Options:
A.

Verifying the identity of a person, network host, or system process.

B.

Physically destroying the media and the information stored on it.

C.

Assessing the risk involved in making a confidential document available to public.

D.

Removing the content from the media so that it is difficult to restore.

Questions 74

Which of the following works at the network layer and hides the local area network IP address and topology?

Options:
A.

Hub

B.

MAC address

C.

Network address translation (NAT)

D.

Network interface card (NIC)

Questions 75

Which of the following provides high availability of data?

Options:
A.

RAID

B.

Anti-virus software

C.

Backup

D.

EFS

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.