Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISP Practice Exam with Questions & Answers | Set: 7

Questions 91

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Blowfish

B.

DES

C.

RC4

D.

IDEA

GIAC GISP Premium Access
Questions 92

Which of the following technologies are forms of single sign-on (SSO)?

Each correct answer represents a complete solution. Choose three.

Options:
A.

CoSign

B.

SESAME

C.

Kerberos

D.

RADIUS

Questions 93

Which of the following is used by attackers to obtain an authenticated connection on a network?

Options:
A.

Back door

B.

Replay attack

C.

Denial-of-Service (DoS) attack

D.

Man-in-the-middle attack

Questions 94

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Options:
A.

IPSec

B.

S/MIME

C.

PGP

D.

TLS

Questions 95

Brutus is a password cracking tool that can be used to crack the following authentications:

•HTTP (Basic Authentication)

•HTTP (HTML Form/CGI)

•POP3 (Post Office Protocol v3)

•FTP (File Transfer Protocol)

•SMB (Server Message Block)

•Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Dictionary attack

B.

Brute force attack

C.

Replay attack

D.

Hybrid attack

E.

Man-in-the-middle attack

Questions 96

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

Options:
A.

The transport layer

B.

The session layer

C.

The application layer

D.

The presentation layer

Questions 97

Which of the following types of virus is capable of changing its signature to avoid detection?

Options:
A.

Macro virus

B.

Polymorphic virus

C.

Stealth virus

D.

Boot sector virus

Questions 98

Which of the following statements about Secure Sockets Layer (SSL) are true?

Each correct answer represents a complete solution. Choose two.

Options:
A.

It provides communication privacy, authentication, and message integrity.

B.

It provides mail transfer service.

C.

It provides connectivity between Web browser and Web server.

D.

It uses a combination of public key and symmetric encryption for security of data.

Questions 99

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Options:
A.

PGP

B.

Symmetric

C.

S/MIME

D.

Asymmetric

Questions 100

Which of the following protocols is used with a tunneling protocol to provide security?

Options:
A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Questions 101

Which of the following are politically motivated threats that an organization faces?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Power distribution outages

B.

Civil disobedience

C.

Riot

D.

Vandalism

E.

Terrorist attacks

Questions 102

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

Options:
A.

Fraggle

B.

Ping of death

C.

Jolt

D.

Teardrop

Questions 103

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

He should upgrade his antivirus program.

B.

He should restore his Windows settings.

C.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

Questions 104

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:
A.

SNMP

B.

TLS

C.

HTTP

D.

SSL

Questions 105

You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?

Options:
A.

Enable DNS recursive queries on the DNS server.

B.

Disable DNS reverse lookup on the e-mail server.

C.

Enable DNS reverse lookup on the e-mail server.

D.

Disable DNS recursive queries on the DNS server.

GIAC Related Exams

How to pass GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test Exam
How to pass GIAC GCFW - GIAC Certified Firewall Analyst Exam
How to pass GIAC GCPM - GIAC Certified Project Manager Certification Practice Test Exam
How to pass GIAC GISF - GIAC Information Security Fundamentals Exam
How to pass GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET Exam
How to pass GIAC GSSP-Java - GIAC Secure Software Programmer – Java Exam
How to pass GIAC GSSP-NET-CSHARP - GIAC GIAC Secure Software Programmer - C#.NET Exam

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.