Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 7 out of 14 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which of the following activities is used to take place after recording and registering an incident?

Options:

A.

Restoring


B.

Matching


C.

Analysis


D.

Classification


Questions # 92:

Which of the following task force was formed to examine the impact of Electronic Publishing on the intellectual property rights?

Options:

A.

The IIPTF (International Intellectual Property Task Force)


B.

The EPTF (Electronic Publishing Task Force)


C.

The LATF (Langham Act Task Force)


D.

The IITF (Information Infrastructure Task Force)


Questions # 93:

Which of the following protocols is used to establish a secure TELNET session over TCP/IP?

Options:

A.

PGP


B.

SSH


C.

SSL


D.

IPSEC


Questions # 94:

Fill in the blank with the appropriate value.

Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.

Options:

A.

32


Questions # 95:

Which of the following should propose applicable and effective security controls for managing the risks?

Options:

A.

Risk assessment


B.

Risk treatment plan


C.

Risk communication


D.

Risk management plan


Questions # 96:

Which of the following types of fire comes under Class K fire?

Options:

A.

Cooking oil fire


B.

Electrical fire


C.

Wooden fire


D.

Combustible metal fire


Questions # 97:

Which authentication method uses retinal scanners for authentication process?

Options:

A.

Biometrics


B.

Challenge Handshake Authentication Protocol (CHAP)


C.

Smart cards


D.

Kerberos


E.

Certifications


F.

Multi-factor


Questions # 98:

Which of the following tools can be used by a user to hide his identity?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

War dialer


B.

IPchains


C.

Anonymizer


D.

Proxy server


E.

Rootkit


Questions # 99:

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.

Options:

A.

transport


Questions # 100:

Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?

Options:

A.

CHAP


B.

PAP


C.

EAP


D.

MS-CHAP v2


Questions # 101:

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:

A.

Visitors


B.

Customers


C.

Employees


D.

Hackers


Questions # 102:

The TCP/IP protocol suite uses ____ to identify which service a certain packet is destined for.

Options:

A.

MAC addresses


B.

Port numbers


C.

Subnet masks


D.

IP addresses


Questions # 103:

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For monitoring unauthorized zone transfer


B.

For preventing malware attacks on a DNS server


C.

For recording the number of queries resolved


D.

For measuring a DNS server's performance


Questions # 104:

Which of the following is a source port forwarder and redirector tool?

Options:

A.

Fpipe


B.

NMAP


C.

SuperScan


D.

NSLOOKUP


Questions # 105:

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP


B.

IPSec


C.

FTP


D.

IPX/SPX


Viewing page 7 out of 14 pages
Viewing questions 91-105 out of questions