Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 13 out of 14 pages
Viewing questions 181-195 out of questions
Questions # 181:

Which of the following protocols is used to verify the status of a certificate?

Options:

A.

CEP


B.

HTTP


C.

OSPF


D.

OCSP


Expert Solution
Questions # 182:

Fill in the blank with the appropriate value.

Digital Subscriber Line must be installed within a _______ kilometer radius of the telephone company's access point.

Options:

A.

5.5


Expert Solution
Questions # 183:

Which of the following protocols is used to query and modify information stored within the directory services?

Options:

A.

PPTP


B.

ARP


C.

PAP


D.

LDAP


Expert Solution
Questions # 184:

Which of the following statements about DMZ are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is an anti-virus software that scans the incoming traffic on an internal network.


B.

It is the boundary between the Internet and a private network.


C.

It contains company resources that are available on the Internet, such as Web servers and FTP servers.


D.

It contains an access control list (ACL).


Expert Solution
Questions # 185:

Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?

Options:

A.

Dictionary attack


B.

DDoS attack


C.

Insertion attack


D.

Evasion attack


Expert Solution
Questions # 186:

Which of the following statements about digital signature is true?

Options:

A.

Digital signature compresses the message to which it is applied.


B.

Digital signature is required for an e-mail message to get through a firewall.


C.

Digital signature verifies the identity of the person who applies it to a document.


D.

Digital signature decrypts the contents of documents.


Expert Solution
Questions # 187:

Which of the following statements are true about a Gantt chart?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It displays the duration of a task.


B.

It is easier to plan than PERT.


C.

It displays dependencies between activities.


D.

The impact of slippage is easily determined.


Expert Solution
Questions # 188:

Which of the following components come under the network layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Firewalls


B.

Hub


C.

Routers


D.

MAC addresses


Expert Solution
Questions # 189:

Which of the following is a name, symbol, or slogan with which a product is identified?

Options:

A.

Trademark


B.

Patent


C.

Trade secret


D.

Copyright


Expert Solution
Questions # 190:

At which of the following layers Structured Query Language (SQL) works?

Options:

A.

Physical


B.

Network


C.

Transport


D.

Session


Expert Solution
Questions # 191:

Which of the following refers to encrypted text?

Options:

A.

Plaintext


B.

Cookies


C.

Hypertext


D.

Ciphertext


Expert Solution
Questions # 192:

Which of the following methods backs up all changes made since the last full or normal backup?

Options:

A.

Half backup


B.

Incremental backup


C.

Differential backup


D.

Full backup


Expert Solution
Questions # 193:

Which of the following types of halon is found in portable extinguishers and is stored as a liquid?

Options:

A.

Halon 11


B.

Halon 1301


C.

Halon 1211


D.

Halon-f


Expert Solution
Questions # 194:

Which of the following statements about extranet are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is an area of a company's Web site, which is only available to selected customers, suppliers, an business partners.


B.

It is an area of a company's Web site, which is available to Internet users.


C.

It is an arrangement commonly used for business-to-business relationships.


D.

It is an arrangement commonly used for a company's employees.


Expert Solution
Questions # 195:

Which of the following steps can be taken to protect laptops and data they hold?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use slot locks with cable to connect the laptop to a stationary object.


B.

Keep inventory of all laptops including serial numbers.


C.

Harden the operating system.


D.

Encrypt all sensitive data.


Expert Solution
Viewing page 13 out of 14 pages
Viewing questions 181-195 out of questions