Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 10 out of 14 pages
Viewing questions 136-150 out of questions
Questions # 136:

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Blowfish


B.

DES


C.

RC4


D.

IDEA


Questions # 137:

Which of the following is the default port for Simple Network Management Protocol (SNMP)?

Options:

A.

TCP port 80


B.

TCP port 110


C.

TCP port 25


D.

UDP port 161


Questions # 138:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. While examining a log report, he finds that an intrusion has been attempted by an attacker whose IP address is 0x40.0x3A.0x2B.0xE6. Which of the following decimal IP addresses will respond to the ping on the above Hexadecimal IP address?

Options:

A.

64.58.43.230


B.

64.58.43.231


C.

64.59.43.230


D.

64.58.42.230


Questions # 139:

Identify whether the given statement is true or false.

"Social engineering is the art of convincing people and making them disclose useful information such as account names and passwords."

Options:

A.

False


B.

True


Questions # 140:

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Building Risk free systems


B.

Risk control


C.

Risk identification


D.

Assuring the integrity of organizational data


Questions # 141:

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Assuring the integrity of organizational data


B.

Building Risk free systems


C.

Risk control


D.

Risk identification


Questions # 142:

Which of the following protocols implements VPN using IPSec?

Options:

A.

L2TP


B.

SLIP


C.

PPP


D.

PPTP


Questions # 143:

How many keys are used to encrypt data in symmetric encryption?

Options:

A.

Four


B.

One


C.

Two


D.

Three


Questions # 144:

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Shoulder surfing


B.

Dumpster diving


C.

Placing a backdoor


D.

Eavesdropping


Questions # 145:

Which of the following statements about smurf is true?

Options:

A.

It is a UDP attack that involves spoofing and flooding.


B.

It is an ICMP attack that involves spoofing and flooding.


C.

It is a denial of service (DoS) attack that leaves TCP ports open.


D.

It is an attack with IP fragments that cannot be reassembled.


Questions # 146:

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Options:

A.

PGP


B.

Symmetric


C.

S/MIME


D.

Asymmetric


Questions # 147:

Which of the following statements about symmetric encryption are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It is best suited for encrypting large amount of data.


B.

It is used by Data Encryption Standard (DES) to encrypt data.


C.

It uses two keys - a public key and a private key pair for data encryption.


D.

It is a relatively fast encryption method than public key encryption.


Questions # 148:

Which of the following tools is NOT used for logging network activities in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Timbersee


B.

PsGetSid


C.

PsLoggedOn


D.

Swatch


Questions # 149:

Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

Options:

A.

Snooping


B.

Phishing


C.

SYN attack


D.

Spoofing


Questions # 150:

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

PING


B.

IPCONFIG


C.

TRACERT


D.

NSLOOKUP


Viewing page 10 out of 14 pages
Viewing questions 136-150 out of questions