Pass the GIAC GIAC Certification GISF Questions and answers with CertsForce

Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which term best describes an e-mail that contains incorrect and misleading information or warnings about viruses?

Options:

A.

Blowfish


B.

Spam


C.

Virus


D.

Trojan horse


E.

Hoax


F.

Rlogin


Expert Solution
Questions # 42:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

TCP FTP proxy scanning


B.

Eavesdropping


C.

Fingerprinting


D.

Web ripping


Expert Solution
Questions # 43:

What is a variant with regard to Configuration Management?

Options:

A.

A CI that has the same name as another CI but shares no relationship.


B.

A CI that has the same essential functionality as another CI but a bit different in some small manner.


C.

A CI that particularly refers to a hardware specification.


D.

A CI that particularly refers to a software version.


Expert Solution
Questions # 44:

Which of the following statements about Encapsulating Security Payload (ESP) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It can also be nested with the Layer Two Tunneling Protocol (L2TP).


B.

It is an IPSec protocol.


C.

It is a text-based communication protocol.


D.

It uses TCP port 22 as the default port and operates at the application layer.


Expert Solution
Questions # 45:

At which OSI layer does UDP operate?

Options:

A.

Network layer


B.

Data-link layer


C.

Session layer


D.

Transport layer


E.

Presentation layer


Expert Solution
Questions # 46:

Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?

Options:

A.

ESP


B.

IKE


C.

ISAKMP


D.

AH


Expert Solution
Questions # 47:

Which of the following encryption techniques does digital signatures use?

Options:

A.

MD5


B.

RSA


C.

IDEA


D.

Blowfish


Expert Solution
Questions # 48:

You have created a Web site, which will be used for e-commerce. You want to ensure that the transactions are highly secured. For this purpose, you have to create a system to verify the identity of a potential customer. Which of the following security techniques will you use?

Options:

A.

Asymmetric encryption


B.

Symmetric encryption


C.

Spoofing


D.

Digital certificate


Expert Solution
Questions # 49:

Which of the following security applications is used to secure a database from unauthorized accesses in a network infrastructure?

Options:

A.

Antivirus


B.

Anti-Malware


C.

Anti-Spoofing


D.

Firewall


Expert Solution
Questions # 50:

Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?

Options:

A.

PING attack


B.

Spoofing


C.

Hacking


D.

SYN attack


Expert Solution
Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions