Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 7 out of 14 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which of the following activities is used to take place after recording and registering an incident?

Options:

A.

Restoring


B.

Matching


C.

Analysis


D.

Classification


Expert Solution
Questions # 92:

Which of the following task force was formed to examine the impact of Electronic Publishing on the intellectual property rights?

Options:

A.

The IIPTF (International Intellectual Property Task Force)


B.

The EPTF (Electronic Publishing Task Force)


C.

The LATF (Langham Act Task Force)


D.

The IITF (Information Infrastructure Task Force)


Expert Solution
Questions # 93:

Which of the following protocols is used to establish a secure TELNET session over TCP/IP?

Options:

A.

PGP


B.

SSH


C.

SSL


D.

IPSEC


Expert Solution
Questions # 94:

Fill in the blank with the appropriate value.

Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.

Options:

A.

32


Expert Solution
Questions # 95:

Which of the following should propose applicable and effective security controls for managing the risks?

Options:

A.

Risk assessment


B.

Risk treatment plan


C.

Risk communication


D.

Risk management plan


Expert Solution
Questions # 96:

Which of the following types of fire comes under Class K fire?

Options:

A.

Cooking oil fire


B.

Electrical fire


C.

Wooden fire


D.

Combustible metal fire


Expert Solution
Questions # 97:

Which authentication method uses retinal scanners for authentication process?

Options:

A.

Biometrics


B.

Challenge Handshake Authentication Protocol (CHAP)


C.

Smart cards


D.

Kerberos


E.

Certifications


F.

Multi-factor


Expert Solution
Questions # 98:

Which of the following tools can be used by a user to hide his identity?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

War dialer


B.

IPchains


C.

Anonymizer


D.

Proxy server


E.

Rootkit


Expert Solution
Questions # 99:

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.

Options:

A.

transport


Expert Solution
Questions # 100:

Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?

Options:

A.

CHAP


B.

PAP


C.

EAP


D.

MS-CHAP v2


Expert Solution
Questions # 101:

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:

A.

Visitors


B.

Customers


C.

Employees


D.

Hackers


Expert Solution
Questions # 102:

The TCP/IP protocol suite uses ____ to identify which service a certain packet is destined for.

Options:

A.

MAC addresses


B.

Port numbers


C.

Subnet masks


D.

IP addresses


Expert Solution
Questions # 103:

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For monitoring unauthorized zone transfer


B.

For preventing malware attacks on a DNS server


C.

For recording the number of queries resolved


D.

For measuring a DNS server's performance


Expert Solution
Questions # 104:

Which of the following is a source port forwarder and redirector tool?

Options:

A.

Fpipe


B.

NMAP


C.

SuperScan


D.

NSLOOKUP


Expert Solution
Questions # 105:

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP


B.

IPSec


C.

FTP


D.

IPX/SPX


Expert Solution
Viewing page 7 out of 14 pages
Viewing questions 91-105 out of questions