Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISP Practice Exam with Questions & Answers | Set: 8

Questions 106

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

Strong encryption software should be used to store credit card information.

C.

The NTFS file system should be implemented on a client computer.

D.

Limited and authorized access should be allowed on the stored credit card information.

GIAC GISP Premium Access
Questions 107

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

Options:
A.

Spoofing

B.

Auditing

C.

Shielding

D.

System hardening

Questions 108

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. While examining a log report, he finds that an intrusion has been attempted by an attacker whose IP address is 0x40.0x3A.0x2B.0xE6. Which of the following decimal IP addresses will respond to the ping on the above Hexadecimal IP address?

Options:
A.

64.58.43.230

B.

64.58.43.231

C.

64.59.43.230

D.

64.58.42.230

Questions 109

Which of the following areas of a network contains DNS servers and Web servers for Internet users?

Options:
A.

MMZ

B.

VPN

C.

DMZ

D.

VLAN

Questions 110

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails.

Which of the following will you use to accomplish this?

Options:
A.

PPTP

B.

IPSec

C.

PGP

D.

NTFS

Questions 111

Which of the following access control models requires centralize database of user accounts?

Options:
A.

User based

B.

Data based

C.

Group based

D.

Partitions based

Questions 112

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Building Risk free systems

B.

Risk control

C.

Risk identification

D.

Assuring the integrity of organizational data

Questions 113

Which of the following is known as a message digest?

Options:
A.

Message authentication code

B.

Hash function

C.

Hashing algorithm

D.

Spider

Questions 114

Which of the following involves identifying and minimizing the effect of risks?

Options:
A.

Risk profile

B.

Recovery plan

C.

Risk plan

D.

Risk retention

Questions 115

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Shoulder surfing

B.

Dumpster diving

C.

Placing a backdoor

D.

Eavesdropping

Questions 116

Key escrow is a method of __________.

Options:
A.

Key renewal

B.

Key distribution

C.

Key recovery

D.

key revocation

Questions 117

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

Options:
A.

RAID-1

B.

RAID-4

C.

RAID-3

D.

RAID-0

E.

RAID-5

Questions 118

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

•Network diagrams of the we-are-secure infrastructure

•Source code of the security tools

•IP addressing information of the we-are-secure network

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

Options:
A.

Graybox

B.

Whitebox

C.

Blackbox

D.

Alpha testing

Questions 119

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:
A.

Visitors

B.

Customers

C.

Employees

D.

Hackers

Questions 120

Which of the following is a duplicate of the original site of an organization, with fully working systems as well as near-complete backups of user data?

Options:
A.

Hot site

B.

Cold site

C.

Data site

D.

Warm site

GIAC Related Exams

How to pass GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test Exam
How to pass GIAC GCFW - GIAC Certified Firewall Analyst Exam
How to pass GIAC GCPM - GIAC Certified Project Manager Certification Practice Test Exam
How to pass GIAC GISF - GIAC Information Security Fundamentals Exam
How to pass GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET Exam
How to pass GIAC GSSP-Java - GIAC Secure Software Programmer – Java Exam
How to pass GIAC GSSP-NET-CSHARP - GIAC GIAC Secure Software Programmer - C#.NET Exam

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.