New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

GISP GIAC Information Security Professional Questions and Answers

Questions 4

Which of the following needs to be documented to preserve evidences for presentation in court?

Options:

A.

Separation of duties

B.

Account lockout policy

C.

Chain of custody

D.

Incident response policy

Buy Now
Questions 5

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Eavesdropping

B.

Dumpster diving

C.

Placing a backdoor

D.

Shoulder surfing

Buy Now
Questions 6

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

PGP

B.

IPSec

C.

TLS

D.

S/MIME

Buy Now
Questions 7

Which of the following statements about Switched Multimegabit Data Service (SMDS) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a logical connection between two devices.

B.

It uses fixed-length (53-byte) packets to transmit information.

C.

It supports speeds of 1.544 Mbps over Digital Signal level 1 (DS-1) transmission facilities.

D.

It is a high-speed WAN networking technology used for communication over public data networks

Buy Now
Questions 8

Which of the following steps can be taken to protect laptops and data they hold?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use slot locks with cable to connect the laptop to a stationary object.

B.

Keep inventory of all laptops including serial numbers.

C.

Harden the operating system.

D.

Encrypt all sensitive data.

Buy Now
Questions 9

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

Options:

A.

SPAP

B.

MSCHAP V2

C.

PAP

D.

MSCHAP

Buy Now
Questions 10

Which of the following is a source port forwarder and redirector tool?

Options:

A.

Fpipe

B.

NMAP

C.

SuperScan

D.

NSLOOKUP

Buy Now
Questions 11

Which of the following is the process of overwriting all addressable locations on a disk?

Options:

A.

Sanitization

B.

Authentication

C.

Spoofing

D.

Drive wiping

Buy Now
Questions 12

Which of the following are the application layer protocols for security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Secure Hypertext Transfer Protocol (S-HTTP)

B.

Secure Sockets Layer (SSL)

C.

Secure Electronic Transaction (SET)

D.

Secure Shell (SSH)

Buy Now
Questions 13

Which of the following terms is used for a router that filters traffic before it is passed to the firewall?

Options:

A.

Honey pot

B.

Bastion host

C.

Demilitarized zone (DMZ)

D.

Screened host

Buy Now
Questions 14

Which of the following protocols is used to query and modify information stored within the directory services?

Options:

A.

PPTP

B.

ARP

C.

PAP

D.

LDAP

Buy Now
Questions 15

Which of the following authentication methods support mutual authentication?

Each correct answer represents a complete solution. Choose two.

Options:

A.

MS-CHAP v2

B.

EAP-TLS

C.

EAP-MD5

D.

NTLM

Buy Now
Questions 16

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.

IEEE 802.4

B.

IEEE 802.11b

C.

IEEE 802.5

D.

IEEE 802.3

Buy Now
Questions 17

Which of the following is the default port for the NetBIOS name service?

Options:

A.

UDP port 137

B.

TCP port 110

C.

UDP port 138

D.

TCP port 119

Buy Now
Questions 18

Which of the following processes is known as sanitization?

Options:

A.

Physically destroying the media and the information stored on it.

B.

Assessing the risk involved in discarding particular information.

C.

Verifying the identity of a person, network host, or system process.

D.

Removing the content from the media so that it is difficult to restore.

Buy Now
Questions 19

Which of the following heights of fence deters only casual trespassers?

Options:

A.

3 to 4 feet

B.

2 to 2.5 feet

C.

8 feet

D.

6 to 7 feet

Buy Now
Questions 20

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

Options:

A.

UDP port 1701

B.

UDP port 161

C.

TCP port 443

D.

TCP port 110

Buy Now
Questions 21

Which of the following are the responsibilities of the owner with regard to data in an information classification program?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Delegating the responsibility of the data protection duties to a custodian.

B.

Determining what level of classification the information requires.

C.

Running regular backups and routinely testing the validity of the backup data.

D.

Reviewing the classification assignments at regular time intervals and making changes as the business needs change.

Buy Now
Questions 22

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

False positive

B.

False negative

C.

True negative

D.

True positive

Buy Now
Questions 23

Which of the following is a name, symbol, or slogan with which a product is identified?

Options:

A.

Trademark

B.

Patent

C.

Trade secret

D.

Copyright

Buy Now
Questions 24

Which of the following encryption algorithms are based on block ciphers?

Options:

A.

RC4

B.

RC5

C.

Twofish

D.

Rijndael

Buy Now
Questions 25

You work as a Network Administrator for Infonet Inc. The company's network has an FTP server.

You want to secure the server so that only authorized users can access it. What will you do to accomplish this?

Options:

A.

Stop the FTP service on the server.

B.

Disable anonymous authentication.

C.

Disable the network adapter on the server.

D.

Enable anonymous authentication.

Buy Now
Questions 26

Which of the following statements is true about transient noise?

Options:

A.

It is a momentary low voltage condition.

B.

It is a short duration of power line disruption.

C.

It is a prolonged power supply that is below the normal voltage.

D.

It is an electrical current that does not fluctuate.

Buy Now
Questions 27

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.

You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open?

Each correct answer represents a complete solution. Choose two.

Options:

A.

20

B.

80

C.

110

D.

25

Buy Now
Questions 28

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

Options:

A.

Wiretapping

B.

Spoofing

C.

Data diddling

D.

Eavesdropping

Buy Now
Questions 29

Which of the following tools can be used by a user to hide his identity?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

War dialer

B.

IPchains

C.

Anonymizer

D.

Proxy server

E.

Rootkit

Buy Now
Questions 30

Which of the following are the examples of technical controls?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Auditing

B.

System access

C.

Data backups

D.

Network acchitecture

Buy Now
Questions 31

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It backs up the entire database, including the transaction log.

B.

It is the fastest method of backing up data.

C.

It backs up only the files changed since the most recent backup and clears the archive bit.

D.

It is the slowest method for taking a data backup.

Buy Now
Questions 32

Which of the following encryption strengths is used to secure NTLM version 2 passwords?

Options:

A.

128-bit

B.

32-bit

C.

64-bit

D.

56-bit

Buy Now
Questions 33

Which of the following statements about IPSec are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses Password Authentication Protocol (PAP) for user authentication.

B.

It uses Encapsulating Security Payload (ESP) for data confidentiality.

C.

It uses Internet Protocol (IP) for data integrity.

D.

It uses Authentication Header (AH) for data integrity.

Buy Now
Questions 34

Which of the following layers are the sub layers of the data-link layer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Media Access Control (MAC)

B.

Logical Link Control (LLC)

C.

Reserve Address Resolution Protocol (RARP)

D.

Serial Line Internet Protocol (SLIP)

Buy Now
Questions 35

Which of the following provides the best protection against a man-in-the-middle attack?

Options:

A.

Strong encryption

B.

Fiber-optic cable

C.

Strong password

D.

Firewall

Buy Now
Questions 36

Which of the following allows an attacker to enter malicious data into a Website?

Options:

A.

Cross site scripting

B.

Inline scripting

C.

Windows PowerShell scripting

D.

Client-side scripting

Buy Now
Questions 37

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Spoofing

B.

Cryptanalysis

C.

Steganography

D.

Packet sniffing

Buy Now
Questions 38

Which of the following statements regarding Secure Sockets Layer (SSL) are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SSL provides message integrity to prevent alteration to the message.

B.

SSL can process credit cards.

C.

During SSL session, information is encrypted to prevent unauthorized disclosure.

D.

SSL can support 128-bit encryption.

Buy Now
Questions 39

Which of the following statements about System Access Control List (SACL) is true?

Options:

A.

It exists for each and every permission entry assigned to any object.

B.

It is a mechanism for reducing the need for globally unique IP addresses.

C.

It contains a list of both users and groups and whatever permissions they have.

D.

It contains a list of any events that are set to audit for that particular object.

Buy Now
Questions 40

It is the technique for gathering information for a Web site owner about a user through a few lines of code that reside in the Web pages. This information is gathered through __________.

Options:

A.

Spyware

B.

Spambot

C.

Bogus spyware removal programs

D.

Web Bugs

Buy Now
Questions 41

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

WEP uses the RC4 encryption algorithm.

B.

The Initialization Vector (IV) field of WEP is only 24 bits long.

C.

Automated tools such as AirSnort are available for discovering WEP keys.

D.

It provides better security than the Wi-Fi Protected Access protocol.

Buy Now
Questions 42

Which of the following protocols provides functionalities for advanced management associated with the use of digital certificates such as certificate issuance, exchange, and revocation?

Options:

A.

Hypertext Transfer Protocol Secure (HTTPS)

B.

Certificate Management Protocol (CMP)

C.

Extensible Authentication Protocol-Transport Level Security (EAP-TLS)

D.

Certificate Enrollment Protocol (CEP)

Buy Now
Questions 43

Which of the following devices reads the destination's MAC address from each incoming data packet and forwards the data packet to its destination?

Options:

A.

Hub

B.

Router

C.

Brouter

D.

Switch

Buy Now
Questions 44

Which of the following allows an administrator to find weak passwords on the network?

Options:

A.

Rainbow table

B.

Back door

C.

Worm

D.

Access control list

Buy Now
Questions 45

Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?

Options:

A.

64-bit

B.

16-bit

C.

32-bit

D.

128-bit

Buy Now
Questions 46

Which of the following are man-made threats that an organization faces?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Frauds

B.

Strikes

C.

Employee errors

D.

Theft

Buy Now
Questions 47

Which of the following is a program that monitors data packets traveling across a network?

Options:

A.

Sniffer

B.

Smurf

C.

Hacker

D.

BitLocker

Buy Now
Questions 48

Which of the following occurs when a packet is sent from a source computer to a destination computer?

Options:

A.

Broadcast transmission

B.

Unicast transmission

C.

Multicast transmission

D.

Baseband transmission

Buy Now
Questions 49

Which of the following tools is used for breaking digital watermark?

Options:

A.

TRACERT

B.

Trin00

C.

Fpipe

D.

2Mosaic

Buy Now
Questions 50

Which of the following tools is used to flood the local network with random MAC addresses?

Options:

A.

NETSH

B.

NMAP

C.

Port scanner

D.

Macof

Buy Now
Questions 51

Which of the following are the responsibilities of a custodian with regard to data in an information classification program?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Running regular backups and routinely testing the validity of the backup data

B.

Performing data restoration from the backups when necessary

C.

Controlling access, adding and removing privileges for individual users

D.

Determining what level of classification the information requires

Buy Now
Questions 52

In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

Options:

A.

Ciphertext only attack

B.

Chosen ciphertext attack

C.

Known plaintext attack

D.

Chosen plaintext attack

Buy Now
Questions 53

What are the benefits of using a proxy server on a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It enhances network security.

B.

It cuts down dial-up charges.

C.

It is used for automated assignment of IP addresses to a TCP/IP client in the domain.

D.

It uses a single registered IP address for multiple connections to the Internet.

Buy Now
Questions 54

Which of the following devices performs protocol and format translations?

Options:

A.

Switch

B.

Modem

C.

Gateway

D.

Repeater

Buy Now
Questions 55

Which of the following types of computers is used for attracting potential intruders?

Options:

A.

Honey pot

B.

Bastion host

C.

Data pot

D.

Files pot

Buy Now
Questions 56

Which of the following are types of social engineering attacks?

Each correct answer represents a complete solution. Choose two.

Options:

A.

An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.

B.

An unauthorized person inserts an intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts.

C.

An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.

D.

An unauthorized person modifies packet headers by using someone else's IP address to hide his identity.

Buy Now
Questions 57

Which of the following statements about a smart card are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is used to securely store public and private keys for log on , e-mail signing and encryption, and file encryption.

B.

It is a device that routes data packets between computers in different networks.

C.

It is a device that contains a microprocessor and permanent memory.

D.

It is a device that works as an interface between a computer and a network.

Buy Now
Questions 58

You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer's log:

45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72

Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?

Options:

A.

16, ICMP

B.

41, TCP

C.

16, UDP

D.

41, UDP

Buy Now
Questions 59

Fill in the blank with the appropriate value.

Twofish symmetric key block cipher operates on 128-bits block size using key sizes up to______ bits.

Options:

A.

256

Buy Now
Questions 60

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

Options:

A.

Bridge

B.

Antivirus software

C.

Gateway

D.

Firewall

Buy Now
Questions 61

Which of the following needs to be documented to preserve evidences for presentation in court?

Options:

A.

Incident response policy

B.

Separation of duties

C.

Chain of custody

D.

Account lockout policy

Buy Now
Questions 62

Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

Options:

A.

Sanitization

B.

Cryptography

C.

Hardening

D.

Authentication

Buy Now
Questions 63

Which of the following security models deal only with integrity?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Biba

B.

Bell-LaPadula

C.

Biba-Wilson

D.

Clark-Wilson

Buy Now
Questions 64

Which of the following layers protocols handles file transfer and network management?

Options:

A.

Application

B.

Transport

C.

Presentation

D.

Session

Buy Now
Questions 65

Which of the following services is provided by the message authentication code (MAC) ?

Options:

A.

Data recovery

B.

Integrity

C.

Fault tolerance

D.

Key recovery

Buy Now
Questions 66

On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?

Options:

A.

Session layer

B.

Transport layer

C.

Application layer

D.

Data-link layer

Buy Now
Questions 67

Which of the following should propose applicable and effective security controls for managing the risks?

Options:

A.

Risk assessment

B.

Risk treatment plan

C.

Risk communication

D.

Risk management plan

Buy Now
Questions 68

Identify whether the given statement is true or false.

"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

Options:

A.

False

B.

True

Buy Now
Questions 69

Which of the following types of computers is used for attracting potential intruders?

Options:

A.

Honey pot

B.

Bastion host

C.

Data pot

D.

Files pot

Buy Now
Questions 70

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Shoulder surfing

B.

Dumpster diving

C.

Placing a backdoor

D.

Eavesdropping

Buy Now
Questions 71

A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.

Options:

A.

Man-in-the-middle

B.

Brute force

C.

Denial of Service (DoS)

D.

Dictionary

Buy Now
Questions 72

Which of the following is an international treaty that governs intellectual property?

Options:

A.

The Paris Convention

B.

The Washington Convention

C.

The Beijing Convention

D.

The Dalai Lama convention

E.

The London Convention

Buy Now
Questions 73

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:

A.

Visitors

B.

Customers

C.

Employees

D.

Hackers

Buy Now
Questions 74

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:

A.

B-rated

B.

A-rated

C.

D-rated

D.

C-rated

Buy Now
Questions 75

The TCP/IP protocol suite uses ____ to identify which service a certain packet is destined for.

Options:

A.

MAC addresses

B.

Port numbers

C.

Subnet masks

D.

IP addresses

Buy Now
Questions 76

What are packet sniffers?

Options:

A.

Packet sniffers test package security.

B.

Packet sniffers capture the packages as they cross the network.

C.

Packet sniffers encrypt the packages as they cross the network.

D.

Packet sniffers test the packages to verify data integrity.

Buy Now
Questions 77

The _______ protocol allows applications to communicate across a network in a way designed to prevent eavesdropping and message forgery.

Options:

A.

PPP

B.

TCP

C.

EAP

D.

TLS

Buy Now
Questions 78

The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from children under __ years of age without verifiable permission of a parent?

Options:

A.

15

B.

13

C.

10

D.

21

E.

18

Buy Now
Questions 79

Which of the following ports is used by a BOOTP server?

Options:

A.

UDP port 389

B.

UDP port 67

C.

TCP port 80

D.

TCP port 110

Buy Now
Questions 80

Which of the following are the phases of the Certification and Accreditation (C&A) process?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Auditing

B.

Initiation

C.

Detection

D.

Continuous Monitoring

Buy Now
Questions 81

The 802.11b wireless standard has a data transfer speed of up to ________.

Options:

A.

11Mbps

B.

110Mbps

C.

54Mbps

D.

56Mbps

Buy Now
Questions 82

A ________ is a detailed step-by-step document that explains exactly what is to be done.

Options:

A.

Procedure

B.

Baseline

C.

Standard

D.

Rule

Buy Now
Questions 83

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

Options:

A.

Brute force attack

B.

Spoofing

C.

PING attack

D.

SYN attack

Buy Now
Questions 84

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Collusion

B.

Phishing

C.

Buffer overflow

D.

Eavesdropping

Buy Now
Questions 85

Which of the following services are provided by Remote Authentication Dial-In User Service (RADIUS)?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Authentication

B.

Data encryption

C.

Authorization

D.

Accounting

Buy Now
Questions 86

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails.

Which of the following will you use to accomplish this?

Options:

A.

PPTP

B.

IPSec

C.

PGP

D.

NTFS

Buy Now
Questions 87

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Buy Now
Questions 88

How many keys are used to encrypt data in symmetric encryption?

Options:

A.

Four

B.

One

C.

Two

D.

Three

Buy Now
Questions 89

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.

Backup policy

B.

Network security policy

C.

Privacy policy

D.

User password policy

Buy Now
Questions 90

In which of the following processes, a DNS server may return an incorrect IP address, diverting traffic to another computer?

Options:

A.

TCP FIN scanning

B.

DNS poisoning

C.

Snooping

D.

TCP SYN scanning

Buy Now
Questions 91

Which of the following is not a biometrics technology for authentication?

Options:

A.

Fingerprint

B.

Voiceprint

C.

Facial geometry

D.

User password

Buy Now
Questions 92

Which of the following are the centralized administration technologies?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

RADIUS

B.

TACACS+

C.

Peer-to-Peer

D.

Media Access control

Buy Now
Questions 93

Which of the following is the default port for Simple Network Management Protocol (SNMP)?

Options:

A.

TCP port 80

B.

TCP port 110

C.

TCP port 25

D.

UDP port 161

Buy Now
Questions 94

Which of the following hashing algorithms produces a variable length hash value?

Options:

A.

MD5

B.

SHA

C.

HAVAL

D.

MD4

Buy Now
Questions 95

Which of the following protocols implements VPN using IPSec?

Options:

A.

L2TP

B.

SLIP

C.

PPP

D.

PPTP

Buy Now
Questions 96

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:

A.

Visitors

B.

Customers

C.

Employees

D.

Hackers

Buy Now
Questions 97

Which of the following statements about packet filtering is true?

Options:

A.

It allows or restricts the flow of encrypted packets to provide security.

B.

It is used to send confidential data on the public network.

C.

It allows or restricts the flow of specific types of packets to provide security.

D.

It is used to store information about confidential data.

Buy Now
Questions 98

Routers and firewalls use _______ to determine which packets should be forwarded or dropped.

Options:

A.

Encryption

B.

Security audit log

C.

Access control list

D.

Ciphering

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Dec 22, 2024
Questions: 659

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99