Pass the GIAC GIAC Certification GISF Questions and answers with CertsForce

Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions
Questions # 51:

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

Options:

A.

Antivirus software


B.

Gateway


C.

Firewall


D.

Bridge


Expert Solution
Questions # 52:

Which of the following are the levels of public or commercial data classification system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Sensitive


B.

Unclassified


C.

Confidential


D.

Public


E.

Secret


F.

Private


Expert Solution
Questions # 53:

You are hired by Techmart Inc. to upgrade its existing network. You have prepared a case study for planning the network.

According to your study, how many domains are required to setup the network of Techmart Inc.?

(Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Two


B.

Four


C.

Three


D.

One


Expert Solution
Questions # 54:

Firekiller 2000 is an example of a __________.

Options:

A.

DoS attack Trojan


B.

Data sending Trojan


C.

Remote access Trojan


D.

Security software disabler Trojan


Expert Solution
Questions # 55:

Which of the following is an information gathering technique that is used to identify risks?

Options:

A.

Diagramming technique


B.

Assumption analysis


C.

Checklist analysis


D.

Delphi technique


Expert Solution
Questions # 56:

In packet filtering types of firewalls, which of the following specifies what traffic can and cannot traverse the firewall?

Options:

A.

Internet bot


B.

Access control list


C.

ASDM


D.

RIP


Expert Solution
Questions # 57:

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

Options:

A.

Smurf DoS attack


B.

Teardrop attack


C.

Fraggle DoS attack


D.

Ping flood attack


Expert Solution
Questions # 58:

Which of the following protocols implements VPN using IPSec?

Options:

A.

SLIP


B.

PPTP


C.

PPP


D.

L2TP


Expert Solution
Questions # 59:

The TCP/IP protocol suite uses ____ to identify which service a certain packet is destined for.

Options:

A.

Subnet masks


B.

IP addresses


C.

MAC addresses


D.

Port numbers


Expert Solution
Questions # 60:

Which of the following is NOT a phase of the OODA Loop strategy?

Options:

A.

Observe


B.

Define


C.

Orient


D.

Act


Expert Solution
Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions