Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 10 out of 14 pages
Viewing questions 136-150 out of questions
Questions # 136:

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Blowfish


B.

DES


C.

RC4


D.

IDEA


Expert Solution
Questions # 137:

Which of the following is the default port for Simple Network Management Protocol (SNMP)?

Options:

A.

TCP port 80


B.

TCP port 110


C.

TCP port 25


D.

UDP port 161


Expert Solution
Questions # 138:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. While examining a log report, he finds that an intrusion has been attempted by an attacker whose IP address is 0x40.0x3A.0x2B.0xE6. Which of the following decimal IP addresses will respond to the ping on the above Hexadecimal IP address?

Options:

A.

64.58.43.230


B.

64.58.43.231


C.

64.59.43.230


D.

64.58.42.230


Expert Solution
Questions # 139:

Identify whether the given statement is true or false.

"Social engineering is the art of convincing people and making them disclose useful information such as account names and passwords."

Options:

A.

False


B.

True


Expert Solution
Questions # 140:

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Building Risk free systems


B.

Risk control


C.

Risk identification


D.

Assuring the integrity of organizational data


Expert Solution
Questions # 141:

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Assuring the integrity of organizational data


B.

Building Risk free systems


C.

Risk control


D.

Risk identification


Expert Solution
Questions # 142:

Which of the following protocols implements VPN using IPSec?

Options:

A.

L2TP


B.

SLIP


C.

PPP


D.

PPTP


Expert Solution
Questions # 143:

How many keys are used to encrypt data in symmetric encryption?

Options:

A.

Four


B.

One


C.

Two


D.

Three


Expert Solution
Questions # 144:

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Shoulder surfing


B.

Dumpster diving


C.

Placing a backdoor


D.

Eavesdropping


Expert Solution
Questions # 145:

Which of the following statements about smurf is true?

Options:

A.

It is a UDP attack that involves spoofing and flooding.


B.

It is an ICMP attack that involves spoofing and flooding.


C.

It is a denial of service (DoS) attack that leaves TCP ports open.


D.

It is an attack with IP fragments that cannot be reassembled.


Expert Solution
Questions # 146:

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Options:

A.

PGP


B.

Symmetric


C.

S/MIME


D.

Asymmetric


Expert Solution
Questions # 147:

Which of the following statements about symmetric encryption are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It is best suited for encrypting large amount of data.


B.

It is used by Data Encryption Standard (DES) to encrypt data.


C.

It uses two keys - a public key and a private key pair for data encryption.


D.

It is a relatively fast encryption method than public key encryption.


Expert Solution
Questions # 148:

Which of the following tools is NOT used for logging network activities in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Timbersee


B.

PsGetSid


C.

PsLoggedOn


D.

Swatch


Expert Solution
Questions # 149:

Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

Options:

A.

Snooping


B.

Phishing


C.

SYN attack


D.

Spoofing


Expert Solution
Questions # 150:

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

PING


B.

IPCONFIG


C.

TRACERT


D.

NSLOOKUP


Expert Solution
Viewing page 10 out of 14 pages
Viewing questions 136-150 out of questions