Pass the GIAC GIAC Certification GISF Questions and answers with CertsForce

Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following monitors program activities and modifies malicious activities on a system?

Options:

A.

Back door


B.

HIDS


C.

RADIUS


D.

NIDS


Expert Solution
Questions # 82:

Which of the following provides a credential that can be used by all Kerberos-enabled servers and applications?

Options:

A.

Remote Authentication Dial In User Service (RADIUS)


B.

Internet service provider (ISP)


C.

Network Access Point (NAP)


D.

Key Distribution Center (KDC)


Expert Solution
Questions # 83:

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

Options:

A.

Cryptography


B.

OODA loop


C.

Risk analysis


D.

Firewall security


Expert Solution
Questions # 84:

Which Wireless network standard operates at 2.4 GHz and transfers data at a rate of 54 Mbps?

Options:

A.

802.11a


B.

802.11n


C.

802.11b


D.

802.11g


Expert Solution
Questions # 85:

The security of a computer against the unauthorized usage largely depends upon the efficiency of the applied access control method. Which of the following statements are true about a computer access control method?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It can be based upon fingerprint or eye recognition.


B.

It can be time-synchronous.


C.

It provides security against the virus attacks.


D.

It provides security against Eavesdropping.


E.

It checks the authenticity of a person.


F.

It is used to encrypt a message before transmitting it on a network.


Expert Solution
Questions # 86:

Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?

Options:

A.

American Bankers Association


B.

Central Security Service (CSS)


C.

National Institute of Standards and Technology (NIST)


D.

International Telecommunications Union


E.

Request for Comments (RFC)


F.

National Security Agency (NSA)


Expert Solution
Questions # 87:

The new security policy requires you to encrypt all data transmitted from the laptop computers of sales personnel to the distribution centers. How will you implement the security requirements?

(Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Use 40-bit encryption for Routing and Remote Access Service(RRAS) Server. Use PPTP without packet filtering for VPN.


B.

Use 128-bit encryption for Routing and Remote Access Service(RRAS) Server. Use PPTP without packet filtering for VPN.


C.

Use 128-bit encryption for Routing and Remote Access Service(RRAS) Server. Use PPTP with packet filtering for VPN.


D.

Use 40-bit encryption for the Routing and Remote Access Service(RRAS) Server. Use PPTP with packet filtering for VPN.


Expert Solution
Questions # 88:

You have an antivirus program for your network. It is dependent upon using lists of known viruses. What is this type of scan called?

Options:

A.

Heuristic


B.

Fixed List


C.

Dictionary


D.

Host Based


Expert Solution
Questions # 89:

You work as a Software Developer for Mansoft Inc. You create an application. You want to use the application to encrypt data. You use the HashAlgorithmType enumeration to specify the algorithm used for generating Message Authentication Code (MAC) in Secure Sockets Layer (SSL) communications.

Which of the following are valid values for HashAlgorithmType enumeration?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

MD5


B.

None


C.

DES


D.

RSA


E.

SHA1


F.

3DES


Expert Solution
Questions # 90:

Which of the following protocols work at the Network layer of the OSI model?

Options:

A.

Internet Group Management Protocol (IGMP)


B.

Simple Network Management Protocol (SNMP)


C.

Routing Information Protocol (RIP)


D.

File Transfer Protocol (FTP)


Expert Solution
Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions