Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 5 out of 14 pages
Viewing questions 61-75 out of questions
Questions # 61:

SSL session keys are available in which of the following lengths?

Options:

A.

64-bit and 128-bit.


B.

40-bit and 64-bit.


C.

128-bit and 1,024-bit.


D.

40-bit and 128-bit.


Questions # 62:

Which of the following services are provided by Remote Authentication Dial-In User Service (RADIUS)?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Authentication


B.

Data encryption


C.

Authorization


D.

Accounting


Questions # 63:

Which of the following IP addresses are private addresses?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

10.0.0.3


B.

192.168.15.2


C.

192.166.54.32


D.

19.3.22.17


Questions # 64:

You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?

Options:

A.

Only users within the company.


B.

Anyone can authenticate.


C.

Only users with the correct WEP key.


D.

Only the administrator.


Questions # 65:

Which of the following works at the network layer and hides the local area network IP address and topology?

Options:

A.

Hub


B.

MAC address


C.

Network address translation (NAT)


D.

Network interface card (NIC)


Questions # 66:

Which of the following statements about asymmetric encryption are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Asymmetric encryption uses a public key and a private key pair for data encryption.


B.

Asymmetric encryption is faster as compared to symmetric encryption.


C.

In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.


D.

In asymmetric encryption, only one key is needed to encrypt and decrypt data.


Questions # 67:

Which of the following classes of fire comes under Class C fire?

Options:

A.

Combustible metals fire


B.

Paper or wood fire


C.

Oil fire


D.

Electronic or computer fire


Questions # 68:

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

Options:

A.

Take a full backup daily and use six-tape rotation.


B.

Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.


C.

Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.


D.

Take a full backup daily with the previous night's tape taken offsite.


E.

Take a full backup daily with one tape taken offsite weekly.


F.

Take a full backup on alternate days and keep rotating the tapes.


Questions # 69:

Which of the following types of computers is used for attracting potential intruders?

Options:

A.

Honey pot


B.

Bastion host


C.

Data pot


D.

Files pot


Questions # 70:

Which of the following layers protocols handles file transfer and network management?

Options:

A.

Application


B.

Transport


C.

Presentation


D.

Session


Questions # 71:

Which of the following statements about a bastion host is true?

Options:

A.

It is a computer that is used to resolve the NetBIOS name to an IP address.


B.

It is a computer that is used to resolve the host name to an IP address.


C.

It is a computer that is accessible from the Internet to collect information about internal networks.


D.

It is a computer that must be made secure because it is accessible from the Internet and hence is more vulnerable to attacks.


Questions # 72:

Which of the following performs packet screening for security on the basis of port numbers?

Options:

A.

Switch


B.

DNS


C.

Hub


D.

Firewall


Questions # 73:

Which of the following ensures that a sender cannot deny sending a message?

Options:

A.

Authentication


B.

Snooping


C.

Spoofing


D.

Non repudiation


Questions # 74:

Which of the following statements are true about worms?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Worms can exist inside files such as Word or Excel documents.


B.

Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.


C.

One feature of worms is keystroke logging.


D.

Worms replicate themselves from one system to another without using a host file.


Questions # 75:

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Physical layer


B.

The Network layer


C.

The Data-Link layer


D.

The Presentation layer


Viewing page 5 out of 14 pages
Viewing questions 61-75 out of questions