Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 8 out of 14 pages
Viewing questions 106-120 out of questions
Questions # 106:

International Data Encryption Algorithm (IDEA) is a __________ block cipher.

Options:

A.

32-bit


B.

128-bit


C.

16-bit


D.

64-bit


Questions # 107:

Which of the following statements about DES (Data Encryption Standard) is true?

Options:

A.

Its most widely used symmetric encryption algorithm uses a 56-bit key.


B.

Its most widely used symmetric encryption algorithm uses a 32-bit key.


C.

Its most widely used symmetric encryption algorithm uses a 128-bit key.


D.

Its most widely used symmetric encryption algorithm uses a 64-bit key.


Questions # 108:

Which of the following is not a level of military data-classification system?

Options:

A.

Unclassified


B.

Normal


C.

Confidential


D.

Top secret


Questions # 109:

Which of the following port numbers is used by the HTTPS protocol for secure Web transmission?

Options:

A.

8080


B.

21


C.

110


D.

443


E.

80


F.

25


Questions # 110:

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Shoulder surfing


B.

Dumpster diving


C.

Placing a backdoor


D.

Eavesdropping


Questions # 111:

Which of the following components come under the network layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Firewalls


B.

Hub


C.

Routers


D.

MAC addresses


Questions # 112:

Identify whether the given statement is true or false.

"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

Options:

A.

False


B.

True


Questions # 113:

The 802.11b wireless standard has a data transfer speed of up to ________.

Options:

A.

11Mbps


B.

110Mbps


C.

54Mbps


D.

56Mbps


Questions # 114:

Which of the following is a process of monitoring data packets that travel across a network?

Options:

A.

Packet sniffing


B.

Packet filtering


C.

Shielding


D.

Password guessing


Questions # 115:

Which of the following actions might cause a privacy breach while surfing the Internet?

Options:

A.

Clicking pop-up windows while visiting a Web site.


B.

Conducting only secure transactions.


C.

Deleting mails from unknown sources.


D.

Ignoring banner ads on Web sites.


Questions # 116:

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

Options:

A.

Brute force attack


B.

Spoofing


C.

PING attack


D.

SYN attack


Questions # 117:

Which term best describes an e-mail that contains incorrect and misleading information or warnings about viruses?

Options:

A.

Hoax


B.

Spam


C.

Trojan horse


D.

Virus


E.

Rlogin


F.

Blowfish


Questions # 118:

Which of the following types of virus is capable of changing its signature to avoid detection?

Options:

A.

Stealth virus


B.

Boot sector virus


C.

Macro virus


D.

Polymorphic virus


Questions # 119:

A ________ is a detailed step-by-step document that explains exactly what is to be done.

Options:

A.

Procedure


B.

Baseline


C.

Standard


D.

Rule


Questions # 120:

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:

A.

A-rated


B.

C-rated


C.

B-rated


D.

D-rated


Viewing page 8 out of 14 pages
Viewing questions 106-120 out of questions