Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GISP GIAC Information Security Professional Questions and Answers

Questions 4

You work as a Network Administrator for Net Perfect Inc. The company has a Windows 2000, TCP/IP-based class C network consisting of 200 hosts. The network uses private IP addressing. A computer on the network is connected to the Internet. The management plans to increase the number of hosts to 300. The management also wants all hosts to be able to access the Internet through the existing connection. Which of the following steps will you take to accomplish this?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Implement NAT.

B.

Upgrade your class C network to a class B network.

C.

Add a router to your network.

D.

Add a bridge to your network.

E.

Apply for more IP addresses for your LAN.

Buy Now
Questions 5

Which of the following services is provided by the message authentication code (MAC) ?

Options:

A.

Data recovery

B.

Integrity

C.

Fault tolerance

D.

Key recovery

Buy Now
Questions 6

Which of the following tools is NOT used for logging network activities in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Timbersee

B.

PsGetSid

C.

PsLoggedOn

D.

Swatch

Buy Now
Questions 7

Which of the following is not a biometrics technology for authentication?

Options:

A.

Fingerprint

B.

Voiceprint

C.

Facial geometry

D.

User password

Buy Now
Questions 8

An organization monitors the hard disks of its employees ' computers from time to time. Which policy does this pertain to?

Options:

A.

Backup policy

B.

Network security policy

C.

User password policy

D.

Privacy policy

Buy Now
Questions 9

Which of the following protocols implements VPN using IPSec ?

Options:

A.

L2TP

B.

SLIP

C.

PPP

D.

PPTP

Buy Now
Questions 10

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Snort

B.

SARA

C.

Samhain

D.

Tripwire

Buy Now
Questions 11

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

The NTFS file system should be implemented on a client computer.

C.

Strong encryption software should be used to store credit card information.

D.

Limited and authorized access should be allowed on the stored credit card information.

Buy Now
Questions 12

Which of the following is a process of monitoring data packets that travel across a network?

Options:

A.

Packet sniffing

B.

Packet filtering

C.

Shielding

D.

Password guessing

Buy Now
Questions 13

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Buy Now
Questions 14

In which of the following processes, a DNS server may return an incorrect IP address, diverting traffic to another computer?

Options:

A.

TCP FIN scanning

B.

DNS poisoning

C.

Snooping

D.

TCP SYN scanning

Buy Now
Questions 15

Which of the following protocols work at the session layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

Options:

A.

File Transfer Protocol (FTP)

B.

Remote Procedure Call (RPC)

C.

Network File System (NFS)

D.

Transmission Control Protocol (TCP)

Buy Now
Questions 16

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Shoulder surfing

B.

Dumpster diving

C.

Placing a backdoor

D.

Eavesdropping

Buy Now
Questions 17

What are packet sniffers?

Options:

A.

Packet sniffers test package security.

B.

Packet sniffers capture the packages as they cross the network.

C.

Packet sniffers encrypt the packages as they cross the network.

D.

Packet sniffers test the packages to verify data integrity.

Buy Now
Questions 18

Which of the following are tunneling protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

SMTP

B.

NNTP

C.

L2TP

D.

PPTP

Buy Now
Questions 19

Fill in the blank with the appropriate value.

Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.

Options:

A.

32

Buy Now
Questions 20

Which of the following uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients?

Options:

A.

SSL

B.

TLS

C.

PGP

D.

EAP

Buy Now
Questions 21

Which of the following is the most secure method of authentication?

Options:

A.

Biometrics

B.

Username and password

C.

Smart card

D.

Anonymous

Buy Now
Questions 22

Which of the following encryption algorithms are based on stream ciphers?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Twofish

B.

RC4

C.

FISH

D.

Blowfish

Buy Now
Questions 23

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

•Network diagrams of the we-are-secure infrastructure

•Source code of the security tools

•IP addressing information of the we-are-secure network

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

Options:

A.

Graybox

B.

Whitebox

C.

Blackbox

D.

Alpha testing

Buy Now
Questions 24

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

He should upgrade his antivirus program.

B.

He should restore his Windows settings.

C.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

Buy Now
Questions 25

Key escrow is a method of __________.

Options:

A.

Key renewal

B.

Key distribution

C.

Key recovery

D.

key revocation

Buy Now
Questions 26

Which of the following defines the communication link between a Web server and Web applications?

Options:

A.

Firewall

B.

IETF

C.

CGI

D.

PGP

Buy Now
Questions 27

How many keys are used to encrypt data in symmetric encryption ?

Options:

A.

Four

B.

One

C.

Two

D.

Three

Buy Now
Questions 28

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.

Which of the following DoS attacks is Maria using to accomplish her task?

Options:

A.

Ping flood attack

B.

Smurf DoS attack

C.

Fraggle DoS attack

D.

Teardrop attack

Buy Now
Questions 29

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

SNMP

B.

TLS

C.

HTTP

D.

SSL

Buy Now
Questions 30

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company ' s security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company ' s security policy. What will he do to accomplish this?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Configure the authentication type for the wireless LAN to Open system.

B.

Broadcast SSID to connect to the access point (AP).

C.

Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

D.

Install a firewall software on each wireless access point.

E.

On each client computer, add the SSID for the wireless LAN as the preferred network.

F.

Configure the authentication type for the wireless LAN to Shared Key.

Buy Now
Questions 31

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

Options:

A.

Rootkit

B.

Backdoor

C.

Access control list

D.

Rainbow table

Buy Now
Questions 32

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

Options:

A.

Wiretapping

B.

Spoofing

C.

Data diddling

D.

Eavesdropping

Buy Now
Questions 33

Which of the following is the most secure method of authentication?

Options:

A.

Biometrics

B.

Smart card

C.

Anonymous

D.

Username and password

Buy Now
Questions 34

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Options:

A.

Patent

B.

Snooping

C.

Copyright

D.

Utility model

Buy Now
Questions 35

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

Options:

A.

Spoofing

B.

System hardening

C.

Shielding

D.

Auditing

Buy Now
Questions 36

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

•It displays the signal strength of a wireless network, MAC address, SISD, channel details, etc.

•It is commonly used for the following purposes:

a. War driving

b. Detecting unauthorized access points

c. Detecting causes of interference on a WLAN

d. WEP ICV error tracking

e. Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

Options:

A.

Kismet

B.

NetStumbler

C.

Absinthe

D.

THC-Scan

Buy Now
Questions 37

Which of the following is referred to as Radio Frequency Interference (RFI) and Electromagnetic Interference (EMI)?

Options:

A.

Spike

B.

Brownout

C.

Electrical line noise

D.

Transient

Buy Now
Questions 38

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

IPSec

B.

S/MIME

C.

PGP

D.

TLS

Buy Now
Questions 39

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

Options:

A.

The transport layer

B.

The session layer

C.

The application layer

D.

The presentation layer

Buy Now
Questions 40

Which of the following is the default port for Secure Shell (SSH) ?

Options:

A.

TCP port 443

B.

UDP port 161

C.

UDP port 138

D.

TCP port 22

Buy Now
Questions 41

Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?

Options:

A.

DNS server

B.

Firewall

C.

Proxy server

D.

WINS server

Buy Now
Questions 42

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance

B.

Spam

C.

Dumpster diving

D.

Encapsulation

Buy Now
Questions 43

Which of the following refers to the emulation of the identity of a network computer by an attacking computer?

Options:

A.

Hacking

B.

PING attack

C.

Spoofing

D.

SYN attack

Buy Now
Questions 44

Which of the following access control models uses a predefined set of access privileges for an object of a system?

Options:

A.

Policy Access Control

B.

Mandatory Access Control

C.

Role-Based Access Control

D.

Discretionary Access Control

Buy Now
Questions 45

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.

You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open?

Each correct answer represents a complete solution. Choose two.

Options:

A.

20

B.

80

C.

110

D.

25

Buy Now
Questions 46

Which of the following is the most common method used by attackers to identify wireless networks?

Options:

A.

Back door

B.

Packet filtering

C.

Packet sniffing

D.

War driving

Buy Now
Questions 47

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. While examining a log report, he finds that an intrusion has been attempted by an attacker whose IP address is 0x40.0x3A.0x2B.0xE6. Which of the following decimal IP addresses will respond to the ping on the above Hexadecimal IP address?

Options:

A.

64.58.43.230

B.

64.58.43.231

C.

64.59.43.230

D.

64.58.42.230

Buy Now
Questions 48

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails .

Which of the following will you use to accomplish this?

Options:

A.

PPTP

B.

IPSec

C.

PGP

D.

NTFS

Buy Now
Questions 49

Which of the following types of activities can be audited for security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Data downloading from the Internet

B.

Network logons and logoffs

C.

File and object access

D.

Printer access

Buy Now
Questions 50

You are a salesperson. You are authorized to access only the information that is essential for your work. Which of the following access control models is used in your organization?

Options:

A.

Role-Based Access Control

B.

Discretionary Access Control

C.

Mandatory Access Control

D.

Rule-Based Access Control

E.

Privilege Access Control

Buy Now
Questions 51

Which of the following is a duplicate of the original site of an organization, with fully working systems as well as near-complete backups of user data?

Options:

A.

Hot site

B.

Cold site

C.

Data site

D.

Warm site

Buy Now
Questions 52

SSL session keys are available in which of the following lengths?

Options:

A.

64-bit and 128-bit.

B.

40-bit and 64-bit.

C.

128-bit and 1,024-bit.

D.

40-bit and 128-bit.

Buy Now
Questions 53

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Worm

B.

Biometrics

C.

Denial-of-Service (DoS)

D.

Trojan horse

Buy Now
Questions 54

What is the hash value length of the Secure Hash Algorithm (SHA-1)?

Options:

A.

164-bit

B.

320-bit

C.

128-bit

D.

160-bit

Buy Now
Questions 55

Which of the following classes of IP addresses allows a maximum of 2,097,152 networks?

Options:

A.

Class C

B.

Class B

C.

Class D

D.

Class A

Buy Now
Questions 56

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company ' s network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

Options:

A.

Take a full backup daily and use six-tape rotation.

B.

Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday ' s backup offsite.

C.

Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday ' s backup offsite.

D.

Take a full backup daily with the previous night ' s tape taken offsite.

E.

Take a full backup daily with one tape taken offsite weekly.

F.

Take a full backup on alternate days and keep rotating the tapes.

Buy Now
Questions 57

Which of the following viruses masks itself from applications or utilities to hide itself by detection of anti-virus software?

Options:

A.

Macro virus

B.

E-mail virus

C.

Stealth virus

D.

Polymorphic virus

Buy Now
Questions 58

Which of the following services are provided by Remote Authentication Dial-In User Service (RADIUS) ?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Authentication

B.

Data encryption

C.

Authorization

D.

Accounting

Buy Now
Questions 59

Which of the following features of a switch helps to protect network from MAC flood and MAC spoofing?

Options:

A.

Port security

B.

Multi-Authentication

C.

Quality of Service (QoS)

D.

MAC Authentication Bypass

Buy Now
Questions 60

You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?

Options:

A.

Only users within the company.

B.

Anyone can authenticate.

C.

Only users with the correct WEP key.

D.

Only the administrator.

Buy Now
Questions 61

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company ' s network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

Options:

A.

Bridge

B.

Antivirus software

C.

Gateway

D.

Firewall

Buy Now
Questions 62

Which of the following statements about asymmetric encryption are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Asymmetric encryption uses a public key and a private key pair for data encryption.

B.

Asymmetric encryption is faster as compared to symmetric encryption.

C.

In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.

D.

In asymmetric encryption, only one key is needed to encrypt and decrypt data.

Buy Now
Questions 63

Which of the following protocols work at the Network layer of the OSI model?

Options:

A.

Routing Information Protocol (RIP)

B.

Internet Group Management Protocol (IGMP)

C.

Simple Network Management Protocol (SNMP)

D.

File Transfer Protocol (FTP)

Buy Now
Questions 64

Which of the following ports is used by a BOOTP server?

Options:

A.

UDP port 389

B.

UDP port 67

C.

TCP port 80

D.

TCP port 110

Buy Now
Questions 65

Fill in the blank with the appropriate value.

Twofish symmetric key block cipher operates on 128-bits block size using key sizes up to______ bits.

Options:

A.

256

Buy Now
Questions 66

Which of the following books is used to examine integrity and availability?

Options:

A.

Brown Book

B.

Purple Book

C.

Orange Book

D.

Red Book

Buy Now
Questions 67

Which of the following provides the best protection against a man-in-the-middle attack?

Options:

A.

Strong encryption

B.

Fiber-optic cable

C.

Strong password

D.

Firewall

Buy Now
Questions 68

You work as a Network Administrator for Infonet Inc. The company ' s network is connected to the Internet. The network has a Web server that is accessible to Internet users. For security, you want to keep the Web server separate from other servers on the network. Where will you place the Web server?

Options:

A.

In a virtual private network (VPN)

B.

With the authentication server

C.

In a demilitarized zone (DMZ)

D.

With the database server

Buy Now
Questions 69

Which of the following processes is known as Declassification ?

Options:

A.

Verifying the identity of a person, network host, or system process.

B.

Physically destroying the media and the information stored on it.

C.

Assessing the risk involved in making a confidential document available to public.

D.

Removing the content from the media so that it is difficult to restore.

Buy Now
Questions 70

Which of the following conditions the line to keep voltage steady and clean?

Options:

A.

Power regulator

B.

Demilitarized zone (DMZ)

C.

Transponder

D.

Smoke detector

Buy Now
Questions 71

Which of the following are the goals of the cryptographic systems?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Availability

B.

Authentication

C.

Integrity

D.

Confidentiality

Buy Now
Questions 72

Which of the following protocols implements VPN using IPSec ?

Options:

A.

PPP

B.

L2TP

C.

PPTP

D.

SLIP

Buy Now
Questions 73

What are the benefits of using a proxy server on a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It enhances network security.

B.

It cuts down dial-up charges.

C.

It is used for automated assignment of IP addresses to a TCP/IP client in the domain.

D.

It uses a single registered IP address for multiple connections to the Internet.

Buy Now
Questions 74

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

Options:

A.

Packaging

B.

Spoofing

C.

Eavesdropping

D.

Shielding

Buy Now
Questions 75

Which of the following provides secure online payment services?

Options:

A.

CA

B.

IEEE

C.

ACH

D.

ICSA

Buy Now
Questions 76

Which of the following works at the network layer and hides the local area network IP address and topology?

Options:

A.

Hub

B.

MAC address

C.

Network address translation (NAT)

D.

Network interface card (NIC)

Buy Now
Questions 77

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

Options:

A.

Cryptanalysis

B.

Kerberos

C.

Cryptographer

D.

Cryptography

Buy Now
Questions 78

Which of the following occurs when a packet is sent from a source computer to a destination computer?

Options:

A.

Broadcast transmission

B.

Unicast transmission

C.

Multicast transmission

D.

Baseband transmission

Buy Now
Questions 79

Which of the following is used by attackers to obtain an authenticated connection on a network?

Options:

A.

Denial-of-Service (DoS) attack

B.

Replay attack

C.

Man-in-the-middle attack

D.

Back door

Buy Now
Questions 80

Which of the following protects from electrical and magnetic induction that causes interference to the power voltage?

Options:

A.

Power regulator

B.

Shielded line

C.

Firewall

D.

Smoke detector

Buy Now
Questions 81

You work as a Network Administrator for McRoberts Inc. The company has a TCP-based network, which is connected to the Internet. Users use their Web browsers to connect to Web servers and to view different Web pages. Which of the following protocols ensures a secure connection between a Web browser and a Web server?

Options:

A.

L2TP

B.

SSL

C.

IPSec

D.

PPTP

Buy Now
Questions 82

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company ' s network. You have to configure your company ' s router for it. By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

21

B.

443

C.

80

D.

22

Buy Now
Questions 83

Which of the following statements about a smart card are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is used to securely store public and private keys for log on , e-mail signing and encryption, and file encryption.

B.

It is a device that routes data packets between computers in different networks.

C.

It is a device that contains a microprocessor and permanent memory.

D.

It is a device that works as an interface between a computer and a network.

Buy Now
Questions 84

Which of the following are considered Bluetooth security violations?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Social engineering

B.

Bluesnarfing

C.

SQL injection attack

D.

Bluebug attack

E.

Cross site scripting attack

Buy Now
Questions 85

Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?

Options:

A.

LMHOSTS

B.

Bastion host

C.

Firewall

D.

Gateway

Buy Now
Questions 86

Fill in the blanks with the appropriate values.

International Data Encryption Algorithm (IDEA) is a _____ -bit block cipher that uses a ________-bit key.

Options:

A.

64,128

Buy Now
Questions 87

You work in a company that accesses the Internet frequently. This makes the company ' s files susceptible to attacks from unauthorized access. You want to protect your company ' s network from external attacks. Which of the following options will help you in achieving your aim?

Options:

A.

HTTP

B.

FTP

C.

Firewall

D.

Gopher

Buy Now
Questions 88

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

Options:

A.

Fragmentation overlap attack

B.

Evasion attack

C.

Fragmentation overwrite attack

D.

Insertion attack

Buy Now
Questions 89

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

Options:

A.

Chain of custody

B.

Evidence access policy

C.

Chain of evidence

D.

Incident response policy

Buy Now
Questions 90

Which of the following terms refers to the process in which headers and trailers are added around user data?

Options:

A.

Encryption

B.

Encapsulation

C.

Authentication

D.

Authorization

Buy Now
Questions 91

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

Options:

A.

TCP port 110

B.

UDP port 161

C.

UDP port 1701

D.

TCP port 443

Buy Now
Questions 92

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Buy Now
Questions 93

The backup system that stores only those files that have been changed since the last backup is known as ______.

Options:

A.

Full backup

B.

Incremental backup

C.

Differential backup

D.

Filter backup

E.

Exclusive backup

F.

File backup

Buy Now
Questions 94

Which of the following statements about certification authority (CA) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is an entity in a network, which manages security credentials and public keys for message encryption.

B.

It issues certificates that confirm the identity and other attributes of a certificate in relation to other entities.

C.

It is an entity in a network, which manages files and objects.

D.

It issues private keys that confirm the identity and other attributes of a certificate in relation to other entities.

Buy Now
Questions 95

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Assuring the integrity of organizational data

B.

Building Risk free systems

C.

Risk control

D.

Risk identification

Buy Now
Questions 96

Which of the following classes of fire comes under Class C fire?

Options:

A.

Combustible metals fire

B.

Paper or wood fire

C.

Oil fire

D.

Electronic or computer fire

Buy Now
Questions 97

Which of the following statements about a hoax are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a false warning about a virus.

B.

It spreads through e-mail messages.

C.

It corrupts DLL files.

D.

It is a boot sector virus.

Buy Now
Questions 98

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Blowfish

B.

DES

C.

RC4

D.

IDEA

Buy Now
Questions 99

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

PING

B.

IPCONFIG

C.

TRACERT

D.

NSLOOKUP

Buy Now
Questions 100

Which of the following is NOT a countermeasure against a spoofing attack?

Options:

A.

Patching operating system

B.

Installing Anti-virus software

C.

Patching application

D.

Employing IDS

Buy Now
Questions 101

Which of the following statements about packet filtering is true?

Options:

A.

It allows or restricts the flow of encrypted packets to provide security.

B.

It is used to send confidential data on the public network.

C.

It allows or restricts the flow of specific types of packets to provide security.

D.

It is used to store information about confidential data.

Buy Now
Questions 102

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Options:

A.

Tunneling

B.

Spoofing

C.

Packet filtering

D.

Packet sniffing

Buy Now
Questions 103

Which of the following are the application layer protocols for security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Secure Hypertext Transfer Protocol (S-HTTP)

B.

Secure Sockets Layer (SSL)

C.

Secure Electronic Transaction (SET)

D.

Secure Shell (SSH)

Buy Now
Questions 104

Which of the following are data link layer components?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Switches

B.

Bridges

C.

MAC addresses

D.

Hub

Buy Now
Questions 105

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

Options:

A.

RAID-1

B.

RAID-10

C.

RAID-0

D.

RAID-5

Buy Now
Questions 106

What does the Internet encryption and authentication system named RSA stand for?

Options:

A.

Rivest-Shamir-Adleman

B.

Read System Authority

C.

Rivest-System-Adleman

D.

Remote System Authority

Buy Now
Questions 107

Which of the following are tunneling protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

NNTP

B.

SMTP

C.

L2TP

D.

PPTP

Buy Now
Questions 108

Fill in the blank with the appropriate value.

Digital Subscriber Line must be installed within a _______ kilometer radius of the telephone company ' s access point.

Options:

A.

5.5

Buy Now
Questions 109

Andrew works as a Network Administrator for Infonet Inc. The company ' s network has a Web server that hosts the company ' s Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL) . Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Secret

B.

Asymmetric

C.

Synchronous

D.

Symmetric

Buy Now
Questions 110

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

Options:

A.

Cross site scripting

B.

Man-in-the-middle attack

C.

Cookie poisoning

D.

Computer-based social engineering

Buy Now
Questions 111

Which of the following layers of the OSI model provides end-to-end service?

Options:

A.

The physical layer

B.

The application layer

C.

The session layer

D.

The transport layer

Buy Now
Questions 112

Which of the following protocols is used to establish a secure TELNET session over TCP/IP?

Options:

A.

SSL

B.

PGP

C.

IPSEC

D.

SSH

Buy Now
Questions 113

Which of the following are used to suppress paper or wood fires?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Water

B.

Kerosene

C.

CO2

D.

Soda acid

Buy Now
Questions 114

You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS) . You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish this?

Options:

A.

Copy the files to a network share on a FAT32 volume.

B.

Copy the files to a network share on an NTFS volume.

C.

Place the files in an encrypted folder. Then, copy the folder to a floppy disk.

D.

Copy the files to a floppy disk that has been formatted using Windows 2000 Professional.

Buy Now
Questions 115

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Options:

A.

Social engineering attack

B.

Password guessing attack

C.

Mail bombing

D.

Cross site scripting attack

Buy Now
Questions 116

Which of the following statements about Due Care policy is true?

Options:

A.

It provides information about new viruses.

B.

It is a method used to authenticate users on a network.

C.

It identifies the level of confidentiality of information.

D.

It is a method for securing database servers.

Buy Now
Questions 117

Which of the following rate systems of Orange book has mandatory protection of the Trusted Computing Base (TCB)?

Options:

A.

B-rated system

B.

A-rated system

C.

D-rated system

D.

C-Rated system

Buy Now
Questions 118

Which of the following statements about digital signature is true?

Options:

A.

Digital signature compresses the message to which it is applied.

B.

Digital signature is required for an e-mail message to get through a firewall.

C.

Digital signature verifies the identity of the person who applies it to a document.

D.

Digital signature decrypts the contents of documents.

Buy Now
Questions 119

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Load balancing

B.

Ease of maintenance

C.

Failover

D.

Reduce power consumption

Buy Now
Questions 120

Which of the following steps can be taken to protect laptops and data they hold?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use slot locks with cable to connect the laptop to a stationary object.

B.

Keep inventory of all laptops including serial numbers.

C.

Harden the operating system.

D.

Encrypt all sensitive data.

Buy Now
Questions 121

Which of the following statements about the One Time Password (OTP) security system are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It requires a password only once to authenticate users.

B.

It requires a new password every time a user authenticates himself.

C.

It generates passwords by using either the MD4 or MD5 hashing algorithm.

D.

It generates passwords by using Kerberos v5.

Buy Now
Questions 122

Which of the following attacks involves multiple compromised systems to attack a single target?

Options:

A.

Brute force attack

B.

DDoS attack

C.

Dictionary attack

D.

Replay attack

Buy Now
Questions 123

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He writes the following snort rule:

This rule can help him protect the We-are-secure server from the __________.

Options:

A.

Chernobyl virus

B.

I LOVE YOU virus

C.

Melissa virus

D.

Nimda virus

Buy Now
Questions 124

Which of the following protocols work at the data-link layer?

Each correct answer represents a complete solution. Choose two.

Options:

A.

NFS

B.

SSL

C.

ARP

D.

PPP

Buy Now
Questions 125

Which of the following policies is set by a network administrator to allow users to keep their emails and documents for a fixed period of time?

Options:

A.

Retention policy

B.

Password policy

C.

Audit policy

D.

Backup policy

Buy Now
Questions 126

Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?

Options:

A.

Anti-x

B.

LIDS

C.

Scanlogd

D.

KFSensor

Buy Now
Questions 127

Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?

Options:

A.

IMAP

B.

SNMP

C.

SMTP

D.

POP3

Buy Now
Questions 128

Which of the following encryption algorithms are based on block ciphers?

Options:

A.

RC4

B.

RC5

C.

Twofish

D.

Rijndael

Buy Now
Questions 129

Which of the following cables provides maximum security against electronic eavesdropping on a network?

Options:

A.

Fibre optic cable

B.

NTP cable

C.

STP cable

D.

UTP cable

Buy Now
Questions 130

Which of the following statements about a host-based intrusion prevention system (HIPS) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It can detect events scattered over the network.

B.

It is a technique that allows multiple computers to share one or more IP addresses.

C.

It cannot detect events scattered over the network.

D.

It can handle encrypted and unencrypted traffic equally.

Buy Now
Questions 131

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:

A.

B-rated

B.

A-rated

C.

D-rated

D.

C-rated

Buy Now
Questions 132

Which of the following are natural environmental threats that an organization faces?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Storms

B.

Floods

C.

Strikes

D.

Accidents

Buy Now
Questions 133

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

Options:

A.

Session splicing attack

B.

Evasion attack

C.

Insertion attack

D.

Polymorphic shell code attack

Buy Now
Questions 134

Which of the following steps are generally followed in computer forensic examinations?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Acquire

B.

Analyze

C.

Encrypt

D.

Authenticate

Buy Now
Questions 135

Which of the following statements about service pack are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a medium by which product updates are distributed.

B.

It is a term used for securing an operating system.

C.

It is a term generally related to security problems in a software.

D.

It is a collection of Fixes and Patches in a single product.

Buy Now
Questions 136

Which of the following statements about Switched Multimegabit Data Service (SMDS) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a logical connection between two devices.

B.

It uses fixed-length (53-byte) packets to transmit information.

C.

It supports speeds of 1.544 Mbps over Digital Signal level 1 (DS-1) transmission facilities.

D.

It is a high-speed WAN networking technology used for communication over public data networks

Buy Now
Questions 137

Which of the following categories of UTP cable has maximum data transfer rate of 155 Mbps?

Options:

A.

Category 5

B.

Category 3

C.

Category 7

D.

Category 6

Buy Now
Questions 138

Which of the following refers to encrypted text?

Options:

A.

Plaintext

B.

Cookies

C.

Hypertext

D.

Ciphertext

Buy Now
Questions 139

Which of the following is the default port for Secure Shell (SSH) ?

Options:

A.

TCP port 22

B.

UDP port 161

C.

UDP port 138

D.

TCP port 443

Buy Now
Questions 140

Which of the following statements about Discretionary Access Control List (DACL) is true?

Options:

A.

It is a rule list containing access control entries.

B.

It specifies whether an audit activity should be performed when an object attempts to access a resource.

C.

It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.

D.

It is a unique number that identifies a user, group, and computer account.

Buy Now
Questions 141

Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?

Options:

A.

Type II

B.

Type I

C.

Type III

D.

Type IV

Buy Now
Questions 142

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:

A.

RPC

B.

IDLE

C.

UDP

D.

TCP SYN/ACK

Buy Now
Questions 143

Which of the following is used by the Diffie-Hellman encryption algorithm?

Options:

A.

Password

B.

Access control entry

C.

Key exchange

D.

Access control list

Buy Now
Questions 144

Which term best describes an e-mail that contains incorrect and misleading information or warnings about viruses?

Options:

A.

Hoax

B.

Spam

C.

Trojan horse

D.

Virus

E.

Rlogin

F.

Blowfish

Buy Now
Questions 145

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

PGP

B.

TLS

C.

IPSec

D.

S/MIME

Buy Now
Questions 146

Which of the following protocols provides maintenance and error reporting function?

Options:

A.

ICMP

B.

IGMP

C.

PPP

D.

UDP

Buy Now
Questions 147

Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?

Options:

A.

LMHOSTS

B.

Bastion host

C.

Firewall

D.

Gateway

Buy Now
Questions 148

Identify whether the given statement is true or false.

" Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network. "

Options:

A.

False

B.

True

Buy Now
Questions 149

Which of the following types of computers is used for attracting potential intruders?

Options:

A.

Honey pot

B.

Bastion host

C.

Data pot

D.

Files pot

Buy Now
Questions 150

Identify whether the given statement is true or false.

" Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network. "

Options:

A.

False

B.

True

Buy Now
Questions 151

Which of the following is a source port forwarder and redirector tool?

Options:

A.

Fpipe

B.

NMAP

C.

SuperScan

D.

NSLOOKUP

Buy Now
Questions 152

A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.

Options:

A.

Man-in-the-middle

B.

Brute force

C.

Denial of Service (DoS)

D.

Dictionary

Buy Now
Questions 153

Which of the following types of fire comes under Class K fire?

Options:

A.

Cooking oil fire

B.

Electrical fire

C.

Wooden fire

D.

Combustible metal fire

Buy Now
Questions 154

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:

A.

B-rated

B.

A-rated

C.

D-rated

D.

C-rated

Buy Now
Questions 155

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

Options:

A.

Brute force attack

B.

Spoofing

C.

PING attack

D.

SYN attack

Buy Now
Questions 156

Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?

Options:

A.

Single Loss Expectancy x Annualized Rate of Occurrence

B.

ALE before implementing safeguard + ALE after implementing safeguard + annual cost of safeguard

C.

ALE before implementing safeguard - ALE after implementing safeguard - annual cost of safeguar

D.

Asset Value x Exposure factor

Buy Now
Questions 157

__________ is the process of verifying the identity of a user and obtaining required evidences from the user.

Options:

A.

Verification

B.

Impersonation

C.

Authentication

D.

Authorization

Buy Now
Questions 158

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Physical layer

B.

The Network layer

C.

The Data-Link layer

D.

The Presentation layer

Buy Now
Questions 159

Which of the following is an international treaty that governs intellectual property?

Options:

A.

The Paris Convention

B.

The Washington Convention

C.

The Beijing Convention

D.

The Dalai Lama convention

E.

The London Convention

Buy Now
Questions 160

Which of the following processes removes data from the media so that it is difficult to restore?

Options:

A.

Overwriting

B.

Degaussing

C.

Sanitization

D.

Declassification

Buy Now
Questions 161

Which of the following port numbers is used by the HTTPS protocol for secure Web transmission?

Options:

A.

8080

B.

21

C.

110

D.

443

E.

80

F.

25

Buy Now
Questions 162

Which of the following law does not protect intellectual property?

Options:

A.

Murphy ' s law

B.

Patent law

C.

Trademark

D.

Copyright

Buy Now
Questions 163

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser ' s address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?

Options:

A.

The site ' s Web server has heavy traffic.

B.

WINS server has no NetBIOS name entry for the server.

C.

DNS entry is not available for the host name.

D.

The site ' s Web server is offline.

Buy Now
Questions 164

Which of the following actions might cause a privacy breach while surfing the Internet?

Options:

A.

Clicking pop-up windows while visiting a Web site.

B.

Conducting only secure transactions.

C.

Deleting mails from unknown sources.

D.

Ignoring banner ads on Web sites.

Buy Now
Questions 165

The _______ protocol allows applications to communicate across a network in a way designed to prevent eavesdropping and message forgery.

Options:

A.

PPP

B.

TCP

C.

EAP

D.

TLS

Buy Now
Questions 166

Which of the following is a type of halon?

Options:

A.

Halon C

B.

Halon 1900

C.

Halon 1301

D.

Halon 1300

Buy Now
Questions 167

Which of the following encryption methods comes under symmetric encryption algorithm?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Blowfish

B.

DES

C.

Diffie-Hellman

D.

RC5

Buy Now
Questions 168

What does TACACS stand for?

Options:

A.

Terminal Authorized Control Access Cyber System

B.

Terminal Adapter Controlling Access Control System

C.

Terminal Access Controller Access Control System

D.

Transfer Access Controller Auto Control System

Buy Now
Questions 169

Which of the following should propose applicable and effective security controls for managing the risks?

Options:

A.

Risk assessment

B.

Risk treatment plan

C.

Risk communication

D.

Risk management plan

Buy Now
Questions 170

Which of the following activities is used to take place after recording and registering an incident?

Options:

A.

Restoring

B.

Matching

C.

Analysis

D.

Classification

Buy Now
Questions 171

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company ' s network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

Options:

A.

Bridge

B.

Antivirus software

C.

Gateway

D.

Firewall

Buy Now
Questions 172

Which of the following IP addresses are private addresses ?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

10.0.0.3

B.

192.168.15.2

C.

192.166.54.32

D.

19.3.22.17

Buy Now
Questions 173

Which of the following is a program that monitors data packets traveling across a network?

Options:

A.

Sniffer

B.

Smurf

C.

Hacker

D.

BitLocker

Buy Now
Questions 174

Which of the following is the default port for Secure Shell (SSH) ?

Options:

A.

TCP port 22

B.

UDP port 161

C.

UDP port 138

D.

TCP port 443

Buy Now
Questions 175

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

HTTP

B.

SSL

C.

SNMP

D.

TLS

Buy Now
Questions 176

Which of the following statements about System Access Control List (SACL) is true?

Options:

A.

It exists for each and every permission entry assigned to any object.

B.

It is a mechanism for reducing the need for globally unique IP addresses.

C.

It contains a list of both users and groups and whatever permissions they have.

D.

It contains a list of any events that are set to audit for that particular object.

Buy Now
Questions 177

Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

Options:

A.

IPSec

B.

NAT

C.

Firewall

D.

MAC address

Buy Now
Questions 178

Which of the following is the default port for DNS zone transfer?

Options:

A.

Port 21

B.

Port 80

C.

Port 23

D.

Port 53

Buy Now
Questions 179

Which of the following books deals with confidentiality?

Options:

A.

Brown Book

B.

Red Book

C.

Purple Book

D.

Orange Book

Buy Now
Questions 180

Which of the following safes are large enough to allow a person to enter?

Options:

A.

Wall safes

B.

Floor safes

C.

Vaults

D.

Chests

Buy Now
Questions 181

Which of the following protocols is responsible for requesting Web pages from a Web server and sending back the responses to the Web browser?

Options:

A.

IP

B.

FTP

C.

HTTP

D.

PPP

Buy Now
Questions 182

Which of the following statements about IPSec are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses Password Authentication Protocol (PAP) for user authentication.

B.

It uses Encapsulating Security Payload (ESP) for data confidentiality.

C.

It uses Internet Protocol (IP) for data integrity.

D.

It uses Authentication Header (AH) for data integrity.

Buy Now
Questions 183

Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

Options:

A.

Port Address Translation (PAT)

B.

Dynamic NAT

C.

Static NAT

D.

Cache NAT

Buy Now
Questions 184

Which of the following records everything a person types using the keyboard?

Options:

A.

Line conditioner

B.

Firewall

C.

Port scanner

D.

Keystroke logger

Buy Now
Questions 185

Which of the following refers to a program that allows access to a system by skipping the security checks?

Options:

A.

Honey pot

B.

Hoax

C.

Back door

D.

Worm

Buy Now
Questions 186

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

WEP uses the RC4 encryption algorithm.

B.

The Initialization Vector (IV) field of WEP is only 24 bits long.

C.

Automated tools such as AirSnort are available for discovering WEP keys.

D.

It provides better security than the Wi-Fi Protected Access protocol.

Buy Now
Questions 187

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Corroborating

B.

Circumstantial

C.

Direct

D.

Incontrovertible

Buy Now
Questions 188

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Spoofing

B.

Cryptanalysis

C.

Steganography

D.

Packet sniffing

Buy Now
Questions 189

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Technical

B.

Administrative

C.

Automatic

D.

Physical

Buy Now
Questions 190

Which of the following is an open source network intrusion detection system?

Options:

A.

Sourcefire

B.

NETSH

C.

Macof

D.

Snort

Buy Now
Questions 191

Which of the following is a term used to refer to access of a wireless Internet connection by bringing one ' s own computer within the range of another ' s wireless connection, and using that service without the subscriber ' s explicit permission or knowledge?

Options:

A.

Mail bombing

B.

Piggybacking

C.

Spoofing

D.

Snooping

Buy Now
Questions 192

Which of the following statements is true about a polymorphic virus ?

Options:

A.

It is a type of virus that removes access permissions from files.

B.

This type of virus hides system files.

C.

It copies itself onto the boot sector of hard disk drives.

D.

It has the ability to change its own signature at the time of infection.

Buy Now
Questions 193

Which of the following uses a tunneling protocol ?

Options:

A.

Firewall

B.

Internet

C.

LAN

D.

VPN

Buy Now
Questions 194

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark ' s financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.

Privacy law

B.

Trademark law

C.

Security law

D.

Copyright law

Buy Now
Questions 195

Which of the following protocols work at the Session layer of the OSI model?

Options:

A.

User Datagram Protocol (UDP)

B.

Trivial File Transfer Protocol (TFTP)

C.

Border Gateway Multicast Protocol (BGMP)

D.

Internet Security Association and Key Management Protocol (ISAKMP)

Buy Now
Questions 196

Which of the following should be implemented to protect an organization from spam ?

Options:

A.

Packet filtering

B.

Auditing

C.

System hardening

D.

E-mail filtering

Buy Now
Questions 197

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against

__________.

Options:

A.

SNMP enumeration

B.

DNS zone transfer

C.

IIS buffer overflow

D.

NetBIOS NULL session

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Apr 30, 2026
Questions: 659

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now GISP testing engine

PDF (Q&A)

$43.57  $124.49
buy now GISP pdf