Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 6 out of 14 pages
Viewing questions 76-90 out of questions
Questions # 76:

Which of the following protocols is responsible for the resolution of IP addresses to media access control (MAC) addresses?

Options:

A.

ARP


B.

PPP


C.

ICMP


D.

HTTP


Questions # 77:

In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

Options:

A.

Ciphertext only attack


B.

Chosen ciphertext attack


C.

Known plaintext attack


D.

Chosen plaintext attack


Questions # 78:

Which of the following is generally practiced by the police or any other recognized governmental authority?

Options:

A.

SMB signing


B.

Phishing


C.

Spoofing


D.

Wiretapping


Questions # 79:

Which of the following is executed when a predetermined event occurs?

Options:

A.

Worm


B.

Trojan horse


C.

Logic bomb


D.

MAC


Questions # 80:

Which of the following protocols uses TCP port 22 as the default port and operates at the application layer?

Options:

A.

Secure Sockets Layer (SSL)


B.

Secure Shell (SSH)


C.

Post Office Protocol version 3 (POP3)


D.

Trivial File Transfer Protocol (TFTP)


Questions # 81:

Which of the following are the phases of the Certification and Accreditation (C&A) process?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Auditing


B.

Initiation


C.

Detection


D.

Continuous Monitoring


Questions # 82:

Which of the following types of computers is used for attracting potential intruders?

Options:

A.

Honey pot


B.

Bastion host


C.

Data pot


D.

Files pot


Questions # 83:

Which of the following is a technique used to attack an Ethernet wired or wireless network?

Options:

A.

DNS poisoning


B.

Keystroke logging


C.

Mail bombing


D.

ARP poisoning


Questions # 84:

Identify whether the given statement is true or false.

"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

Options:

A.

False


B.

True


Questions # 85:

Copper cabling comes under the _______ layer of the OSI model.

Options:

A.

Physical


B.

Session


C.

Network


D.

Application


Questions # 86:

Which of the following encryption strengths is used to secure NTLM version 2 passwords?

Options:

A.

56-bit


B.

32-bit


C.

128-bit


D.

64-bit


Questions # 87:

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?

Options:

A.

Web caching


B.

Hacking


C.

Packet filtering


D.

Spoofing


Questions # 88:

Which of the following encryption methods comes under symmetric encryption algorithm?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Blowfish


B.

DES


C.

Diffie-Hellman


D.

RC5


Questions # 89:

Which of the following is the rating for paper or wood fires?

Options:

A.

Class B


B.

Class A


C.

Class D


D.

Class C


Questions # 90:

What does TACACS stand for?

Options:

A.

Terminal Authorized Control Access Cyber System


B.

Terminal Adapter Controlling Access Control System


C.

Terminal Access Controller Access Control System


D.

Transfer Access Controller Auto Control System


Viewing page 6 out of 14 pages
Viewing questions 76-90 out of questions