Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 3 out of 14 pages
Viewing questions 31-45 out of questions
Questions # 31:

John works as a C programmer. He develops the following C program:

#include

#include

#include

int buffer(char *str) {

char buffer1[10];

strcpy(buffer1, str);

return 1;

}

int main(int argc, char *argv[]) {

buffer (argv[1]);

printf("Executed\n");

return 1;

}

His program is vulnerable to a __________ attack.

Options:

A.

Denial-of-Service


B.

SQL injection


C.

Buffer overflow


D.

Cross site scripting


Expert Solution
Questions # 32:

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

WEP uses the RC4 encryption algorithm.


B.

The Initialization Vector (IV) field of WEP is only 24 bits long.


C.

Automated tools such as AirSnort are available for discovering WEP keys.


D.

It provides better security than the Wi-Fi Protected Access protocol.


Expert Solution
Questions # 33:

Which of the following ports is assigned by the Internet Assigned Number Authority (IANA) for RADIUS accounting?

Options:

A.

TCP/UDP port 992


B.

TCP/UDP port 1813


C.

TCP/UDP port 1812


D.

TCP/UDP port 989


Expert Solution
Questions # 34:

How many keys are used to encrypt data in symmetric encryption?

Options:

A.

Two


B.

Three


C.

Four


D.

One


Expert Solution
Questions # 35:

Which of the following languages is a fourth-generation language?

Options:

A.

FORTRAN


B.

Assembly


C.

C+


D.

SQL


Expert Solution
Questions # 36:

Which of the following terms is synonymous with the willful destruction of another person's property?

Options:

A.

Hacking


B.

Vandalism


C.

Spoofing


D.

Phishing


Expert Solution
Questions # 37:

Which of the following statements about the authentication concept of information security management is true?

Options:

A.

It ensures the reliable and timely access to resources.


B.

It ensures that modifications are not made to data by unauthorized personnel or processes.


C.

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.


D.

It establishes the users' identity and ensures that the users are who they say they are.


Expert Solution
Questions # 38:

Which of the following is an open source network intrusion detection system?

Options:

A.

Sourcefire


B.

NETSH


C.

Macof


D.

Snort


Expert Solution
Questions # 39:

Which of the following layers are the sub layers of the data-link layer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Media Access Control (MAC)


B.

Logical Link Control (LLC)


C.

Reserve Address Resolution Protocol (RARP)


D.

Serial Line Internet Protocol (SLIP)


Expert Solution
Questions # 40:

Which of the following is used in asymmetric encryption?

Options:

A.

Public key and user key


B.

Public key and private key


C.

SSL


D.

NTFS


Expert Solution
Questions # 41:

Which of the following are the common roles with regard to data in an information classification program?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

User


B.

Owner


C.

Custodian


D.

Security auditor


E.

Editor


Expert Solution
Questions # 42:

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails.

Which of the following will you use to accomplish this?

Options:

A.

IPSec


B.

PGP


C.

PPTP


D.

NTFS


Expert Solution
Questions # 43:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?

Options:

A.

HTTPS


B.

HTTP


C.

TELNET


D.

NetBIOS


Expert Solution
Questions # 44:

In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?

Options:

A.

Remote dial-up network


B.

Remote network


C.

Stolen equipment


D.

Local network


Expert Solution
Questions # 45:

You work as a Network Administrator for McRoberts Inc. The company has a TCP-based network, which is connected to the Internet. Users use their Web browsers to connect to Web servers and to view different Web pages. Which of the following protocols ensures a secure connection between a Web browser and a Web server?

Options:

A.

L2TP


B.

SSL


C.

IPSec


D.

PPTP


Expert Solution
Viewing page 3 out of 14 pages
Viewing questions 31-45 out of questions