Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 1 out of 14 pages
Viewing questions 1-15 out of questions
Questions # 1:

How long are cookies in effect if no expiration date is set?

Options:

A.

Forever


B.

Until the session ends.


C.

Fifteen days


D.

One year


Questions # 2:

Which of the following safes are large enough to allow a person to enter?

Options:

A.

Wall safes


B.

Floor safes


C.

Vaults


D.

Chests


Questions # 3:

Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

The server can optionally authenticate the client.


B.

The client always authenticates the server.


C.

The server always authenticates the client.


D.

The client can optionally authenticate the server.


Questions # 4:

Which of the following attributes are used by Lightweight Directory Access Protocol (LDAP) to notify the names of active directory elements?

Each correct answer represents a complete solution. Choose three.

Options:

A.

DC


B.

OU


C.

FN


D.

CN


Questions # 5:

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance


B.

Spam


C.

Dumpster diving


D.

Encapsulation


Questions # 6:

Which of the following statements about IPSec are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses Password Authentication Protocol (PAP) for user authentication.


B.

It uses Encapsulating Security Payload (ESP) for data confidentiality.


C.

It uses Internet Protocol (IP) for data integrity.


D.

It uses Authentication Header (AH) for data integrity.


Questions # 7:

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Options:

A.

Patent


B.

Snooping


C.

Copyright


D.

Utility model


Questions # 8:

Which of the following can provide security against man-in-the-middle attack?

Options:

A.

Strong data encryption during travel


B.

Strong authentication method


C.

Firewall


D.

Anti-virus programs


Questions # 9:

Which of the following types of safes can be chosen by an organization to store data backups or other types of valuables?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Depositaries


B.

Chests


C.

Bottle safe


D.

Wall safe


Questions # 10:

Which of the following statements about packet filtering is true?

Options:

A.

It is used to store information about confidential data.


B.

It is used to send confidential data on the public network.


C.

It allows or restricts the flow of encrypted packets to provide security.


D.

It allows or restricts the flow of specific types of packets to provide security.


Questions # 11:

Which of the following statements about Encapsulating Security Payload (ESP) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It can also be nested with the Layer Two Tunneling Protocol (L2TP).


B.

It is an IPSec protocol.


C.

It uses TCP port 22 as the default port and operates at the application layer.


D.

It is a text-based communication protocol.


Questions # 12:

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.

You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open?

Each correct answer represents a complete solution. Choose two.

Options:

A.

20


B.

80


C.

110


D.

25


Questions # 13:

Which of the following is a documentation of guidelines that are used to create archival copies of important data?

Options:

A.

Backup policy


B.

Security policy


C.

User policy


D.

Audit policy


Questions # 14:

Which of the following protocols is used as the directory access protocol?

Options:

A.

HDAP


B.

NNTP


C.

FTP


D.

LDAP


Questions # 15:

Which of the following statements about a certificate is true?

Options:

A.

A certificate is a method of encryption used to send mails.


B.

A certificate is used to protect intranets against virus attacks.


C.

A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.


D.

A certificate is a digital representation of information that identifies unauthorized communication packets on the Internet and intranets.


Viewing page 1 out of 14 pages
Viewing questions 1-15 out of questions