Pass the GIAC GIAC Certification GISP Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 121-135 out of questions
Questions # 121:

Which of the following statements about certification authority (CA) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is an entity in a network, which manages security credentials and public keys for message encryption.


B.

It issues certificates that confirm the identity and other attributes of a certificate in relation to other entities.


C.

It is an entity in a network, which manages files and objects.


D.

It issues private keys that confirm the identity and other attributes of a certificate in relation to other entities.


Questions # 122:

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Options:

A.

Tunneling


B.

Spoofing


C.

Packet filtering


D.

Packet sniffing


Questions # 123:

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.

Backup policy


B.

Network security policy


C.

User password policy


D.

Privacy policy


Questions # 124:

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Buffer overflow


B.

Collusion


C.

Phishing


D.

Eavesdropping


Questions # 125:

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

Options:

A.

Brute force attack


B.

SYN attack


C.

Spoofing


D.

PING attack


Questions # 126:

Which of the following statements about Secure Sockets Layer (SSL) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It provides communication privacy, authentication, and message integrity.


B.

It provides mail transfer service.


C.

It provides connectivity between Web browser and Web server.


D.

It uses a combination of public key and symmetric encryption for security of data.


Questions # 127:

Which of the following is used to repair missing or damaged system files that might prevent Windows from starting correctly?

Options:

A.

Boot Repair


B.

System Repair


C.

Recovery Repair


D.

Startup Repair


Questions # 128:

Which of the following areas of a network contains DNS servers and Web servers for Internet users?

Options:

A.

MMZ


B.

VPN


C.

DMZ


D.

VLAN


Questions # 129:

Which of the following needs to be documented to preserve evidences for presentation in court?

Options:

A.

Separation of duties


B.

Account lockout policy


C.

Chain of custody


D.

Incident response policy


Questions # 130:

Which of the following protocols work at the session layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

Options:

A.

File Transfer Protocol (FTP)


B.

Remote Procedure Call (RPC)


C.

Network File System (NFS)


D.

Transmission Control Protocol (TCP)


Questions # 131:

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For monitoring unauthorized zone transfer


B.

For preventing malware attacks on a DNS server


C.

For recording the number of queries resolved


D.

For measuring a DNS server's performance


Questions # 132:

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

Options:

A.

Rootkit


B.

Backdoor


C.

Access control list


D.

Rainbow table


Questions # 133:

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Data service


B.

Account service


C.

Authentication service


D.

Ticket-granting service


Questions # 134:

An attacker sends a large number of packets to a target computer that causes denial of service. Which of the following type of attacks is this?

Options:

A.

Flooding


B.

Snooping


C.

Phishing


D.

Spoofing


Questions # 135:

Which of the following authentication methods is used to access public areas of a Web site?

Options:

A.

Anonymous authentication


B.

Multi-factor authentication


C.

Biometrics authentication


D.

Mutual authentication


Viewing page 9 out of 14 pages
Viewing questions 121-135 out of questions