Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 6 out of 14 pages
Viewing questions 76-90 out of questions
Questions # 76:

Which of the following protocols is responsible for the resolution of IP addresses to media access control (MAC) addresses?

Options:

A.

ARP


B.

PPP


C.

ICMP


D.

HTTP


Expert Solution
Questions # 77:

In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

Options:

A.

Ciphertext only attack


B.

Chosen ciphertext attack


C.

Known plaintext attack


D.

Chosen plaintext attack


Expert Solution
Questions # 78:

Which of the following is generally practiced by the police or any other recognized governmental authority?

Options:

A.

SMB signing


B.

Phishing


C.

Spoofing


D.

Wiretapping


Expert Solution
Questions # 79:

Which of the following is executed when a predetermined event occurs?

Options:

A.

Worm


B.

Trojan horse


C.

Logic bomb


D.

MAC


Expert Solution
Questions # 80:

Which of the following protocols uses TCP port 22 as the default port and operates at the application layer?

Options:

A.

Secure Sockets Layer (SSL)


B.

Secure Shell (SSH)


C.

Post Office Protocol version 3 (POP3)


D.

Trivial File Transfer Protocol (TFTP)


Expert Solution
Questions # 81:

Which of the following are the phases of the Certification and Accreditation (C&A) process?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Auditing


B.

Initiation


C.

Detection


D.

Continuous Monitoring


Expert Solution
Questions # 82:

Which of the following types of computers is used for attracting potential intruders?

Options:

A.

Honey pot


B.

Bastion host


C.

Data pot


D.

Files pot


Expert Solution
Questions # 83:

Which of the following is a technique used to attack an Ethernet wired or wireless network?

Options:

A.

DNS poisoning


B.

Keystroke logging


C.

Mail bombing


D.

ARP poisoning


Expert Solution
Questions # 84:

Identify whether the given statement is true or false.

"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

Options:

A.

False


B.

True


Expert Solution
Questions # 85:

Copper cabling comes under the _______ layer of the OSI model.

Options:

A.

Physical


B.

Session


C.

Network


D.

Application


Expert Solution
Questions # 86:

Which of the following encryption strengths is used to secure NTLM version 2 passwords?

Options:

A.

56-bit


B.

32-bit


C.

128-bit


D.

64-bit


Expert Solution
Questions # 87:

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?

Options:

A.

Web caching


B.

Hacking


C.

Packet filtering


D.

Spoofing


Expert Solution
Questions # 88:

Which of the following encryption methods comes under symmetric encryption algorithm?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Blowfish


B.

DES


C.

Diffie-Hellman


D.

RC5


Expert Solution
Questions # 89:

Which of the following is the rating for paper or wood fires?

Options:

A.

Class B


B.

Class A


C.

Class D


D.

Class C


Expert Solution
Questions # 90:

What does TACACS stand for?

Options:

A.

Terminal Authorized Control Access Cyber System


B.

Terminal Adapter Controlling Access Control System


C.

Terminal Access Controller Access Control System


D.

Transfer Access Controller Auto Control System


Expert Solution
Viewing page 6 out of 14 pages
Viewing questions 76-90 out of questions