Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 11 out of 14 pages
Viewing questions 151-165 out of questions
Questions # 151:

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.

Which of the following DoS attacks is Maria using to accomplish her task?

Options:

A.

Ping flood attack


B.

Smurf DoS attack


C.

Fraggle DoS attack


D.

Teardrop attack


Expert Solution
Questions # 152:

Which of the following are the centralized administration technologies?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

RADIUS


B.

TACACS+


C.

Peer-to-Peer


D.

Media Access control


Expert Solution
Questions # 153:

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

SNMP


B.

TLS


C.

HTTP


D.

SSL


Expert Solution
Questions # 154:

Which of the following should propose applicable and effective security controls for managing the risks?

Options:

A.

Risk assessment


B.

Risk treatment plan


C.

Risk communication


D.

Risk management plan


Expert Solution
Questions # 155:

Which of the following defines the communication link between a Web server and Web applications?

Options:

A.

Firewall


B.

IETF


C.

CGI


D.

PGP


Expert Solution
Questions # 156:

Routers and firewalls use _______ to determine which packets should be forwarded or dropped.

Options:

A.

Encryption


B.

Security audit log


C.

Access control list


D.

Ciphering


Expert Solution
Questions # 157:

Which of the following classes of fire comes under Class C fire?

Options:

A.

Combustible metals fire


B.

Paper or wood fire


C.

Oil fire


D.

Electronic or computer fire


Expert Solution
Questions # 158:

Which of the following involves identifying and minimizing the effect of risks?

Options:

A.

Risk profile


B.

Recovery plan


C.

Risk plan


D.

Risk retention


Expert Solution
Questions # 159:

The backup system that stores only those files that have been changed since the last backup is known as ______.

Options:

A.

Full backup


B.

Incremental backup


C.

Differential backup


D.

Filter backup


E.

Exclusive backup


F.

File backup


Expert Solution
Questions # 160:

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NT authentication should be required for all customers before they provide their credit card numbers.


B.

Strong encryption software should be used to store credit card information.


C.

The NTFS file system should be implemented on a client computer.


D.

Limited and authorized access should be allowed on the stored credit card information.


Expert Solution
Questions # 161:

Which of the following database types is a collection of tables that are linked by their primary keys?

Options:

A.

Relational database management system


B.

Object-oriented database management system


C.

Hierarchical database management system


D.

File-oriented database management system


Expert Solution
Questions # 162:

Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?

Options:

A.

Type II


B.

Type I


C.

Type III


D.

Type IV


Expert Solution
Questions # 163:

Which of the following tools can be used to perform polymorphic shell code attacks?

Options:

A.

TrueCrypt


B.

Fragroute


C.

Mendax


D.

ADMutate


Expert Solution
Questions # 164:

Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?

Options:

A.

Sam Spade


B.

NIDS


C.

ACL


D.

Cookies


Expert Solution
Questions # 165:

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

Options:

A.

Piggybacking


B.

Hacking


C.

Session hijacking


D.

Keystroke logging


Expert Solution
Viewing page 11 out of 14 pages
Viewing questions 151-165 out of questions