Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISP Practice Exam with Questions & Answers | Set: 6

Questions 76

Which of the following are the primary components of a discretionary access control (DAC) model?

Each correct answer represents a complete solution. Choose two.

Options:
A.

User's group

B.

Access rights and permissions

C.

File and data ownership

D.

Smart card

GIAC GISP Premium Access
Questions 77

Which of the following are used to suppress electrical and computer fires?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Halon

B.

Soda acid

C.

CO2

D.

Water

Questions 78

What are the benefits of using a proxy server on a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

It enhances network security.

B.

It cuts down dial-up charges.

C.

It is used for automated assignment of IP addresses to a TCP/IP client in the domain.

D.

It uses a single registered IP address for multiple connections to the Internet.

Questions 79

Which of the following is used as a transmission media by the fiber-optic cables?

Options:
A.

Light

B.

Infrared

C.

Electrical current

D.

Radio wave

Questions 80

A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to perform war dialing?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

ToneLoc

B.

THC-Scan

C.

Wingate

D.

NetStumbler

Questions 81

Which of the following defines the communication link between a Web server and Web applications?

Options:
A.

Firewall

B.

IETF

C.

CGI

D.

PGP

Questions 82

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:
A.

Network-based

B.

File-based

C.

Signature-based

D.

Anomaly-based

Questions 83

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Eavesdropping

B.

Dumpster diving

C.

Placing a backdoor

D.

Shoulder surfing

Questions 84

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

Options:
A.

TCP port 110

B.

UDP port 161

C.

UDP port 1701

D.

TCP port 443

Questions 85

How many keys are used to encrypt data in symmetric encryption?

Options:
A.

Four

B.

One

C.

Two

D.

Three

Questions 86

Which of the following tools was developed by the FBI and is used for keystroke logging in order to capture encryption keys and other information useful for deciphering transmissions?

Options:
A.

Alchemy Remote Executor

B.

Stealth Voice Recorder

C.

KeyGhost USB keylogger

D.

KeyGhost keylogger

E.

Magic Lantern

Questions 87

Which of the following are the centralized administration technologies?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

RADIUS

B.

TACACS+

C.

Peer-to-Peer

D.

Media Access control

Questions 88

Which of the following should propose applicable and effective security controls for managing the risks?

Options:
A.

Risk assessment

B.

Risk treatment plan

C.

Risk communication

D.

Risk management plan

Questions 89

You are a salesperson. You are authorized to access only the information that is essential for your work. Which of the following access control models is used in your organization?

Options:
A.

Role-Based Access Control

B.

Discretionary Access Control

C.

Mandatory Access Control

D.

Rule-Based Access Control

E.

Privilege Access Control

Questions 90

Routers and firewalls use _______ to determine which packets should be forwarded or dropped.

Options:
A.

Encryption

B.

Security audit log

C.

Access control list

D.

Ciphering

GIAC Related Exams

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.