Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

GIAC Information Security Professional Question and Answers

GIAC Information Security Professional

Last Update May 18, 2024
Total Questions : 659

We are offering FREE GISP GIAC exam questions. All you do is to just go and sign up. Give your details, prepare GISP free exam questions and then go for complete pool of GIAC Information Security Professional test questions that will help you more.

GISP pdf

GISP PDF

$35  $99.99
GISP Engine

GISP Testing Engine

$42  $119.99
GISP PDF + Engine

GISP PDF + Testing Engine

$56  $159.99
Questions 1

Which of the following statements about smurf is true?

Options:

A.  

It is a UDP attack that involves spoofing and flooding.

B.  

It is an ICMP attack that involves spoofing and flooding.

C.  

It is a denial of service (DoS) attack that leaves TCP ports open.

D.  

It is an attack with IP fragments that cannot be reassembled.

Discussion 0
Questions 2

Which of the following involves identifying and minimizing the effect of risks?

Options:

A.  

Risk profile

B.  

Recovery plan

C.  

Risk plan

D.  

Risk retention

Discussion 0
Questions 3

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Shoulder surfing

B.  

Dumpster diving

C.  

Placing a backdoor

D.  

Eavesdropping

Discussion 0
Questions 4

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.  

Backup policy

B.  

Network security policy

C.  

User password policy

D.  

Privacy policy

Discussion 0
Questions 5

Which of the following is not a major concern in traditional business transactions as compare to online transactions?

Options:

A.  

Bookkeeping

B.  

Security

C.  

Product Quality

D.  

Customer Support

Discussion 0
Questions 6

Which of the following protocols work at the session layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

File Transfer Protocol (FTP)

B.  

Remote Procedure Call (RPC)

C.  

Network File System (NFS)

D.  

Transmission Control Protocol (TCP)

Discussion 0
Questions 7

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

Options:

A.  

Shielding

B.  

Eavesdropping

C.  

Spoofing

D.  

Packaging

Discussion 0
Questions 8

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Blowfish

B.  

DES

C.  

RC4

D.  

IDEA

Discussion 0
Questions 9

An attacker sends a large number of packets to a target computer that causes denial of service. Which of the following type of attacks is this?

Options:

A.  

Flooding

B.  

Snooping

C.  

Phishing

D.  

Spoofing

Discussion 0
Questions 10

Which of the following technologies are forms of single sign-on (SSO)?

Each correct answer represents a complete solution. Choose three.

Options:

A.  

CoSign

B.  

SESAME

C.  

Kerberos

D.  

RADIUS

Discussion 0
Questions 11

Which of the following are politically motivated threats that an organization faces?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Power distribution outages

B.  

Civil disobedience

C.  

Riot

D.  

Vandalism

E.  

Terrorist attacks

Discussion 0
Questions 12

Which of the following ports is used by the control connection on the FTP server?

Options:

A.  

TCP port 23

B.  

TCP port 21

C.  

TCP port 53

D.  

TCP port 443

Discussion 0
Questions 13

Which of the following types of virus is capable of changing its signature to avoid detection?

Options:

A.  

Macro virus

B.  

Polymorphic virus

C.  

Stealth virus

D.  

Boot sector virus

Discussion 0
Questions 14

Which of the following statements about Denial-of-Service (DoS) attack are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.  

It disrupts connections between two computers, preventing communications between services.

B.  

It changes the configuration of the TCP/IP protocol.

C.  

It saturates network resources.

D.  

It disrupts services to a specific computer.

Discussion 0
Questions 15

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.  

PING

B.  

IPCONFIG

C.  

TRACERT

D.  

NSLOOKUP

Discussion 0
Questions 16

You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?

Options:

A.  

Enable DNS recursive queries on the DNS server.

B.  

Disable DNS reverse lookup on the e-mail server.

C.  

Enable DNS reverse lookup on the e-mail server.

D.  

Disable DNS recursive queries on the DNS server.

Discussion 0
Questions 17

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

IPSec

B.  

S/MIME

C.  

PGP

D.  

TLS

Discussion 0
Questions 18

Which of the following should propose applicable and effective security controls for managing the risks?

Options:

A.  

Risk assessment

B.  

Risk treatment plan

C.  

Risk communication

D.  

Risk management plan

Discussion 0
Questions 19

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

Options:

A.  

Brute force attack

B.  

SYN attack

C.  

Spoofing

D.  

PING attack

Discussion 0
Questions 20

Which of the following activities is used to take place after recording and registering an incident?

Options:

A.  

Restoring

B.  

Matching

C.  

Analysis

D.  

Classification

Discussion 0
Questions 21

Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?

Options:

A.  

LMHOSTS

B.  

Bastion host

C.  

Firewall

D.  

Gateway

Discussion 0
Questions 22

Which of the following IP addresses are private addresses?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

10.0.0.3

B.  

192.168.15.2

C.  

192.166.54.32

D.  

19.3.22.17

Discussion 0
Questions 23

Which of the following law does not protect intellectual property?

Options:

A.  

Murphy's law

B.  

Patent law

C.  

Trademark

D.  

Copyright

Discussion 0
Questions 24

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:

A.  

B-rated

B.  

A-rated

C.  

D-rated

D.  

C-rated

Discussion 0
Questions 25

Which of the following services are provided by Remote Authentication Dial-In User Service (RADIUS)?

Each correct answer represents a complete solution. Choose three.

Options:

A.  

Authentication

B.  

Data encryption

C.  

Authorization

D.  

Accounting

Discussion 0
Questions 26

Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?

Options:

A.  

DNS server

B.  

Firewall

C.  

Proxy server

D.  

WINS server

Discussion 0
Questions 27

Which of the following protocols implements VPN using IPSec?

Options:

A.  

L2TP

B.  

SLIP

C.  

PPP

D.  

PPTP

Discussion 0
Questions 28

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

PGP

B.  

TLS

C.  

IPSec

D.  

S/MIME

Discussion 0
Questions 29

Which of the following is the most secure method of authentication?

Options:

A.  

Biometrics

B.  

Username and password

C.  

Smart card

D.  

Anonymous

Discussion 0
Questions 30

Which of the following types of virus is capable of changing its signature to avoid detection?

Options:

A.  

Stealth virus

B.  

Boot sector virus

C.  

Macro virus

D.  

Polymorphic virus

Discussion 0
Questions 31

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.

Options:

A.  

Blackbox testing

B.  

Port redirection

C.  

Firewalking

D.  

Brainstorming

Discussion 0
Questions 32

Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?

Options:

A.  

CHAP

B.  

PAP

C.  

EAP

D.  

MS-CHAP v2

Discussion 0
Questions 33

What does TACACS stand for?

Options:

A.  

Terminal Authorized Control Access Cyber System

B.  

Terminal Adapter Controlling Access Control System

C.  

Terminal Access Controller Access Control System

D.  

Transfer Access Controller Auto Control System

Discussion 0
Questions 34

Which of the following is executed when a predetermined event occurs?

Options:

A.  

Worm

B.  

Trojan horse

C.  

Logic bomb

D.  

MAC

Discussion 0
Questions 35

Which of the following are tunneling protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

SMTP

B.  

NNTP

C.  

L2TP

D.  

PPTP

Discussion 0
Questions 36

Which of the following methods is a behavior-based IDS detection method?

Options:

A.  

Protocol detection

B.  

Statistical anomaly detection

C.  

Pattern matching detection

D.  

Knowledge-based detection

Discussion 0
Questions 37

What are the benefits of using a proxy server on a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

It enhances network security.

B.  

It cuts down dial-up charges.

C.  

It is used for automated assignment of IP addresses to a TCP/IP client in the domain.

D.  

It uses a single registered IP address for multiple connections to the Internet.

Discussion 0
Questions 38

Which of the following features of a switch helps to protect network from MAC flood and MAC spoofing?

Options:

A.  

Port security

B.  

Multi-Authentication

C.  

Quality of Service (QoS)

D.  

MAC Authentication Bypass

Discussion 0
Questions 39

Which of the following security models dictates that subjects can only access objects through applications?

Options:

A.  

Biba-Clark model

B.  

Bell-LaPadula

C.  

Biba model

D.  

Clark-Wilson

Discussion 0
Questions 40

Which of the following protocols is responsible for the resolution of IP addresses to media access control (MAC) addresses?

Options:

A.  

ARP

B.  

PPP

C.  

ICMP

D.  

HTTP

Discussion 0
Questions 41

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Building Risk free systems

B.  

Risk control

C.  

Risk identification

D.  

Assuring the integrity of organizational data

Discussion 0
Questions 42

On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?

Options:

A.  

Session layer

B.  

Transport layer

C.  

Application layer

D.  

Data-link layer

Discussion 0
Questions 43

Identify whether the given statement is true or false.

"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

Options:

A.  

False

B.  

True

Discussion 0
Questions 44

Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?

Options:

A.  

Proxy server

B.  

Security

C.  

Cookies

D.  

Certificate

Discussion 0
Questions 45

Which of the following categories of UTP cable has maximum data transfer rate of 155 Mbps?

Options:

A.  

Category 5

B.  

Category 3

C.  

Category 7

D.  

Category 6

Discussion 0
Questions 46

What will be the best strategy to prevent employees on a Local Area Network from performing unauthorized activities?

Options:

A.  

Grant the employees minimum permissions that are needed to perform the required tasks.

B.  

Limit the number of files that any employee can open at any given time.

C.  

Grant the employees maximum permissions that are needed to perform the required tasks.

D.  

Store the resources on a hard disk that has NTFS partitions.

Discussion 0
Questions 47

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.

Options:

A.  

transport

Discussion 0
Questions 48

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

Options:

A.  

SPAP

B.  

MSCHAP V2

C.  

PAP

D.  

MSCHAP

Discussion 0
Questions 49

Which of the following are used to suppress paper or wood fires?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Water

B.  

Kerosene

C.  

CO2

D.  

Soda acid

Discussion 0
Questions 50

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

He should upgrade his antivirus program.

B.  

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

C.  

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.  

He should restore his Windows settings.

Discussion 0
Questions 51

Which of the following steps are generally followed in computer forensic examinations?

Each correct answer represents a complete solution. Choose three.

Options:

A.  

Acquire

B.  

Analyze

C.  

Encrypt

D.  

Authenticate

Discussion 0
Questions 52

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:

A.  

RPC

B.  

IDLE

C.  

UDP

D.  

TCP SYN/ACK

Discussion 0
Questions 53

You work as a Network Administrator for Infonet Inc. The company's network has an FTP server.

You want to secure the server so that only authorized users can access it. What will you do to accomplish this?

Options:

A.  

Stop the FTP service on the server.

B.  

Disable anonymous authentication.

C.  

Disable the network adapter on the server.

D.  

Enable anonymous authentication.

Discussion 0
Questions 54

Which of the following cables provides maximum security against electronic eavesdropping on a network?

Options:

A.  

Fibre optic cable

B.  

NTP cable

C.  

STP cable

D.  

UTP cable

Discussion 0
Questions 55

Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?

Options:

A.  

Anti-x

B.  

LIDS

C.  

Scanlogd

D.  

KFSensor

Discussion 0
Questions 56

Which of the following statements about a host-based intrusion prevention system (HIPS) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

It can detect events scattered over the network.

B.  

It is a technique that allows multiple computers to share one or more IP addresses.

C.  

It cannot detect events scattered over the network.

D.  

It can handle encrypted and unencrypted traffic equally.

Discussion 0
Questions 57

Which of the following statements about Diffie-Hellman encryption are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

It uses only a private key.

B.  

It uses both a public key and a private key.

C.  

It does not authenticate the parties involved.

D.  

It was developed in 1976.

Discussion 0
Questions 58

Which of the following statements about DMZ is true?

Options:

A.  

DMZ is a corporate network used as the Internet.

B.  

DMZ is a firewall that lies in between two corporate networks.

C.  

DMZ is a network that is not connected to the Internet.

D.  

DMZ is a network that lies in between a corporate network and the Internet.

Discussion 0
Questions 59

These are false reports about non-existent viruses. In these reports, the writer often claims to do impossible things. Due to these false reports, the network administrator shuts down his network, which in turn affects the work of the company. These reports falsely claim to describe an extremely dangerous virus, and declare that the report is issued by a reputed company. These reports are known as __________.

Options:

A.  

Time bombs

B.  

Virus hoaxes

C.  

Chain letters

D.  

Spambots

E.  

Logic bombs

Discussion 0
Questions 60

Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?

Options:

A.  

IMAP

B.  

SNMP

C.  

SMTP

D.  

POP3

Discussion 0
Questions 61

Which of the following standards works at the presentation layer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

ASCII

B.  

MPEG

C.  

TIFF

D.  

JPEG

Discussion 0
Questions 62

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

Options:

A.  

RAID-1

B.  

RAID-10

C.  

RAID-0

D.  

RAID-5

Discussion 0
Questions 63

Which of the following statements about digital signature is true?

Options:

A.  

Digital signature compresses the message to which it is applied.

B.  

Digital signature is required for an e-mail message to get through a firewall.

C.  

Digital signature verifies the identity of the person who applies it to a document.

D.  

Digital signature decrypts the contents of documents.

Discussion 0
Questions 64

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet.

For security, you want to restrict unauthorized access to the network with minimum administrative effort.

You want to implement a hardware-based solution. What will you do to accomplish this?

Options:

A.  

Connect a brouter to the network.

B.  

Implement firewall on the network.

C.  

Connect a router to the network.

D.  

Implement a proxy server on the network.

Discussion 0
Questions 65

Which of the following statements about Network Address Translation (NAT) is true?

Options:

A.  

It hides the public network from internal hosts.

B.  

It hides internal hosts from the public network.

C.  

It uses public IP addresses on an internal network.

D.  

It translates IP addresses into user friendly names.

Discussion 0
Questions 66

Which of the following is the main reason for implementing CCTV as part of the physical arrangement?

Options:

A.  

Authenticating users

B.  

Securing data

C.  

Increasing guard visibility

D.  

Preventing criminal activities

Discussion 0
Questions 67

Which of the following statements are true about worms?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Worms can exist inside files such as Word or Excel documents.

B.  

Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

C.  

One feature of worms is keystroke logging.

D.  

Worms replicate themselves from one system to another without using a host file.

Discussion 0
Questions 68

Which of the following conditions the line to keep voltage steady and clean?

Options:

A.  

Power regulator

B.  

Demilitarized zone (DMZ)

C.  

Transponder

D.  

Smoke detector

Discussion 0
Questions 69

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

Options:

A.  

Bridge

B.  

Antivirus software

C.  

Gateway

D.  

Firewall

Discussion 0
Questions 70

Which of the following methods can be helpful to eliminate social engineering threat?

Each correct answer represents a complete solution. Choose three.

Options:

A.  

Password policies

B.  

Vulnerability assessments

C.  

Data classification

D.  

Data encryption

Discussion 0
Questions 71

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.

Options:

A.  

File virus

B.  

Polymorphic virus

C.  

Stealth virus

D.  

Multipartite virus

E.  

Boot sector virus

Discussion 0
Questions 72

Which of the following terms refers to a momentary low voltage?

Options:

A.  

Blackout

B.  

Spike

C.  

Noise

D.  

Sag

Discussion 0
Questions 73

Which of the following is a term used to refer to access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?

Options:

A.  

Mail bombing

B.  

Piggybacking

C.  

Spoofing

D.  

Snooping

Discussion 0
Questions 74

Where are user accounts and passwords stored in a decentralized privilege management environment?

Options:

A.  

On each server.

B.  

On a central authentication server.

C.  

On more than one server.

D.  

On a server configured for decentralized privilege management.

Discussion 0
Questions 75

Which of the following ports is assigned by the Internet Assigned Number Authority (IANA) for RADIUS accounting?

Options:

A.  

TCP/UDP port 992

B.  

TCP/UDP port 1813

C.  

TCP/UDP port 1812

D.  

TCP/UDP port 989

Discussion 0
Questions 76

Which of the following command-line utilities queries the DNS server to check whether or not the zone database contains the correct information?

Options:

A.  

IPCONFIG

B.  

TELNET

C.  

NSLOOKUP

D.  

NETSTAT

Discussion 0
Questions 77

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.  

Corroborating

B.  

Circumstantial

C.  

Direct

D.  

Incontrovertible

Discussion 0
Questions 78

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.  

Privacy law

B.  

Trademark law

C.  

Security law

D.  

Copyright law

Discussion 0
Questions 79

Which of the following tools or services is used to find the entire IP address range used by an organization?

Options:

A.  

TRACERT

B.  

Ping Scanner

C.  

PATHPING

D.  

Share Scanner

Discussion 0
Questions 80

Which of the following is a documentation of guidelines that are used to create archival copies of important data?

Options:

A.  

Backup policy

B.  

Security policy

C.  

User policy

D.  

Audit policy

Discussion 0
Questions 81

Fill in the blanks with the appropriate values.

Twofish symmetric algorithm operates on _______ -bit blocks and can support a key length of up to ________ bits.

Options:

A.  

128,256

Discussion 0
Questions 82

How many keys are used to encrypt data in symmetric encryption?

Options:

A.  

Two

B.  

Three

C.  

Four

D.  

One

Discussion 0
Questions 83

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Options:

A.  

S/MIME

B.  

PGP

C.  

Symmetric

D.  

Asymmetric

Discussion 0
Questions 84

Which of the following statements about System Access Control List (SACL) is true?

Options:

A.  

It exists for each and every permission entry assigned to any object.

B.  

It is a mechanism for reducing the need for globally unique IP addresses.

C.  

It contains a list of both users and groups and whatever permissions they have.

D.  

It contains a list of any events that are set to audit for that particular object.

Discussion 0
Questions 85

Which of the following refers to the emulation of the identity of a network computer by an attacking computer?

Options:

A.  

Hacking

B.  

PING attack

C.  

Spoofing

D.  

SYN attack

Discussion 0
Questions 86

It is the technique for gathering information for a Web site owner about a user through a few lines of code that reside in the Web pages. This information is gathered through __________.

Options:

A.  

Spyware

B.  

Spambot

C.  

Bogus spyware removal programs

D.  

Web Bugs

Discussion 0
Questions 87

Which of the following statements regarding Secure Sockets Layer (SSL) are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

SSL provides message integrity to prevent alteration to the message.

B.  

SSL can process credit cards.

C.  

During SSL session, information is encrypted to prevent unauthorized disclosure.

D.  

SSL can support 128-bit encryption.

Discussion 0
Questions 88

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

It backs up the entire database, including the transaction log.

B.  

It is the fastest method of backing up data.

C.  

It backs up only the files changed since the most recent backup and clears the archive bit.

D.  

It is the slowest method for taking a data backup.

Discussion 0
Questions 89

Which of the following statements about the authentication concept of information security management is true?

Options:

A.  

It ensures the reliable and timely access to resources.

B.  

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.  

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.

D.  

It establishes the users' identity and ensures that the users are who they say they are.

Discussion 0
Questions 90

Which of the following types of safes can be chosen by an organization to store data backups or other types of valuables?

Each correct answer represents a complete solution. Choose three.

Options:

A.  

Depositaries

B.  

Chests

C.  

Bottle safe

D.  

Wall safe

Discussion 0
Questions 91

Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

Options:

A.  

Sanitization

B.  

Cryptography

C.  

Hardening

D.  

Authentication

Discussion 0
Questions 92

SSL session keys are available in which of the following lengths?

Options:

A.  

64-bit and 128-bit.

B.  

40-bit and 64-bit.

C.  

128-bit and 1,024-bit.

D.  

40-bit and 128-bit.

Discussion 0
Questions 93

You work as a Network Administrator for Net Perfect Inc. The company has a Windows 2000, TCP/IP-based class C network consisting of 200 hosts. The network uses private IP addressing. A computer on the network is connected to the Internet. The management plans to increase the number of hosts to 300. The management also wants all hosts to be able to access the Internet through the existing connection. Which of the following steps will you take to accomplish this?

Each correct answer represents a part of the solution. Choose two.

Options:

A.  

Implement NAT.

B.  

Upgrade your class C network to a class B network.

C.  

Add a router to your network.

D.  

Add a bridge to your network.

E.  

Apply for more IP addresses for your LAN.

Discussion 0
Questions 94

Which of the following is an authentication protocol?

Options:

A.  

LDAP

B.  

PPTP

C.  

TLS

D.  

Kerberos

Discussion 0
Questions 95

Which of the following is a process of monitoring data packets that travel across a network?

Options:

A.  

Packet sniffing

B.  

Packet filtering

C.  

Shielding

D.  

Password guessing

Discussion 0
Questions 96

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

Options:

A.  

Chain of custody

B.  

Evidence access policy

C.  

Chain of evidence

D.  

Incident response policy

Discussion 0
Questions 97

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.  

TCP FTP proxy scanning

B.  

Eavesdropping

C.  

Web ripping

D.  

Fingerprinting

Discussion 0
Questions 98

A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to perform war dialing?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

ToneLoc

B.  

THC-Scan

C.  

Wingate

D.  

NetStumbler

Discussion 0