Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 12 out of 14 pages
Viewing questions 166-180 out of questions
Questions # 166:

Which of the following refers to going through someone's trash to find out useful or confidential information?

Options:

A.

Dumpster diving


B.

Hacking


C.

Phishing


D.

Spoofing


Expert Solution
Questions # 167:

Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?

Options:

A.

Proxy server


B.

Security


C.

Cookies


D.

Certificate


Expert Solution
Questions # 168:

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

Options:

A.

Session splicing attack


B.

Evasion attack


C.

Insertion attack


D.

Polymorphic shell code attack


Expert Solution
Questions # 169:

Which of the following are the examples of administrative controls?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Data Backup


B.

Auditing


C.

Security policy


D.

Security awareness training


Expert Solution
Questions # 170:

Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?

Options:

A.

Spoofing


B.

PING attack


C.

SYN attack


D.

Hacking


Expert Solution
Questions # 171:

Which of the following access control models uses a role based method to determine access rights and permission?

Options:

A.

Discretionary access control


B.

Roaming access control


C.

Nondiscretionary access control


D.

Mandatory access control


Expert Solution
Questions # 172:

Which of the following is the most secure authentication method?

Options:

A.

Certificate-based authentication


B.

Basic authentication


C.

Digest authentication


D.

Integrated Windows authentication


Expert Solution
Questions # 173:

What does the Internet encryption and authentication system named RSA stand for?

Options:

A.

Rivest-Shamir-Adleman


B.

Read System Authority


C.

Rivest-System-Adleman


D.

Remote System Authority


Expert Solution
Questions # 174:

In which of the following attacks does an attacker send a spoofed TCP SYN packet in which the target's IP address is filled in both the source and destination fields?

Options:

A.

Jolt DoS attack


B.

Ping of death attack


C.

Teardrop attack


D.

Land attack


Expert Solution
Questions # 175:

Which of the following languages enable programmers to store cookies on client computers?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Perl


B.

DHTML


C.

JavaScript


D.

HTML


Expert Solution
Questions # 176:

Which of the following protocols is used to establish a secure TELNET session over TCP/IP?

Options:

A.

SSL


B.

PGP


C.

IPSEC


D.

SSH


Expert Solution
Questions # 177:

Which of the following terms is used for a router that filters traffic before it is passed to the firewall?

Options:

A.

Honey pot


B.

Bastion host


C.

Demilitarized zone (DMZ)


D.

Screened host


Expert Solution
Questions # 178:

You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?

Options:

A.

Disable DNS recursive queries on the DNS server.


B.

Enable DNS recursive queries on the DNS server.


C.

Enable DNS reverse lookup on the e-mail server.


D.

Disable DNS reverse lookup on the e-mail server.


Expert Solution
Questions # 179:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He writes the following snort rule:

This rule can help him protect the We-are-secure server from the __________.

Options:

A.

Chernobyl virus


B.

I LOVE YOU virus


C.

Melissa virus


D.

Nimda virus


Expert Solution
Questions # 180:

Which of the following Windows RRAS authentication protocols uses completely unencrypted passwords?

Options:

A.

PAP


B.

MS-CHAP


C.

CHAP


D.

MS-CHAP v2


Expert Solution
Viewing page 12 out of 14 pages
Viewing questions 166-180 out of questions