Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 2 out of 14 pages
Viewing questions 16-30 out of questions
Questions # 16:

Where are user accounts and passwords stored in a decentralized privilege management environment?

Options:

A.

On each server.


B.

On a central authentication server.


C.

On more than one server.


D.

On a server configured for decentralized privilege management.


Questions # 17:

Which of the following is a link-state routing protocol?

Options:

A.

IGRP


B.

RIP v2


C.

RIP v1


D.

OSPF


Questions # 18:

Which of the following protocols is responsible for requesting Web pages from a Web server and sending back the responses to the Web browser?

Options:

A.

IP


B.

FTP


C.

HTTP


D.

PPP


Questions # 19:

Fill in the blanks with the appropriate values.

Twofish symmetric algorithm operates on _______ -bit blocks and can support a key length of up to ________ bits.

Options:

A.

128,256


Questions # 20:

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

•It displays the signal strength of a wireless network, MAC address, SISD, channel details, etc.

•It is commonly used for the following purposes:

a. War driving

b. Detecting unauthorized access points

c. Detecting causes of interference on a WLAN

d. WEP ICV error tracking

e. Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

Options:

A.

Kismet


B.

NetStumbler


C.

Absinthe


D.

THC-Scan


Questions # 21:

Which of the following types of fiber optic cable is generally used in WANs and powered by laser light?

Options:

A.

Multi-mode fiber


B.

Single-mode fiber


C.

Dual-mode fiber


D.

Duplex-mode fiber


Questions # 22:

Which of the following devices reads the destination's MAC address from each incoming data packet and forwards the data packet to its destination?

Options:

A.

Hub


B.

Router


C.

Brouter


D.

Switch


Questions # 23:

Which of the following are the causes of power noise?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Electromagnetic interference


B.

Shielded line


C.

Power regulator


D.

Radio frequency interference


Questions # 24:

Which of the following need to be reduced to suppress a fire?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Oxygen


B.

Fuel


C.

CO2


D.

High temperature


Questions # 25:

Which of the following statements about the availability concept of Information security management is true?

Options:

A.

It ensures that modifications are not made to data by unauthorized personnel or processes.


B.

It determines actions and behaviors of a single individual within a system.


C.

It ensures reliable and timely access to resources.


D.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.


Questions # 26:

Which of the following OSI model layers handles addressing and routing?

Options:

A.

Session


B.

Physical


C.

Network


D.

Application


Questions # 27:

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Options:

A.

Authentication


B.

Non-repudiation


C.

Confidentiality


D.

Integrity


Questions # 28:

Which of the following are threats to network security?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Dial-up connections


B.

Rogue employees


C.

Disabled user accounts


D.

Events auditing


Questions # 29:

Which of the following are the examples of technical controls?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Auditing


B.

System access


C.

Data backups


D.

Network acchitecture


Questions # 30:

Which of the following command-line utilities queries the DNS server to check whether or not the zone database contains the correct information?

Options:

A.

IPCONFIG


B.

TELNET


C.

NSLOOKUP


D.

NETSTAT


Viewing page 2 out of 14 pages
Viewing questions 16-30 out of questions