Pass the GIAC GIAC Certification GISF Questions and answers with CertsForce

Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions
Questions # 91:

Which of the following statements are TRUE regarding asymmetric encryption and symmetric encryption? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Data Encryption Standard (DES) is a symmetric encryption key algorithm.


B.

In symmetric encryption, the secret key is available only to the recipient of the message.


C.

Symmetric encryption is commonly used when a message sender needs to encrypt a large amount of data.


D.

Asymmetric encryption uses a public key and a private key pair for data encryption.


Expert Solution
Questions # 92:

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

Options:

A.

Denial-of-Service


B.

Eavesdropping


C.

Spoofing


D.

Packet manipulation


Expert Solution
Questions # 93:

Which of the following are application layer protocols of Internet protocol (IP) suite?

Each correct answer represents a complete solution. Choose two.

Options:

A.

IGP


B.

IGRP


C.

Telnet


D.

SMTP


Expert Solution
Questions # 94:

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

Options:

A.

Quantitative risk analysis


B.

Risk audits


C.

Qualitative risk analysis


D.

Requested changes


Expert Solution
Questions # 95:

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

Options:

A.

Bandwidth


B.

Load


C.

Delay


D.

Frequency


Expert Solution
Questions # 96:

You are concerned about outside attackers penetrating your network via your company Web server.

You wish to place your Web server between two firewalls

One firewall between the Web server and the outside world

The other between the Web server and your network

What is this called?

Options:

A.

IDS


B.

SPI firewall


C.

DMZ


D.

Application Gateway firewall


Expert Solution
Questions # 97:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The virus, used by John, is not in the database of the antivirus program installed on the ser ver.


B.

The mutation engine of the virus is generating a new encrypted code.


C.

John has created a new virus.


D.

John has changed the signature of the virus.


Expert Solution
Questions # 98:

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?

Options:

A.

Biometric devices


B.

Intrusion detection systems


C.

Key card


D.

CCTV Cameras


Expert Solution
Questions # 99:

Security is responsible for well-being of information and infrastructures in which the possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Availability


B.

Confidentiality


C.

Confidentiality


D.

Authenticity


Expert Solution
Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions