Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

GISP GIAC Information Security Professional Questions and Answers

Questions 4

In which of the following scanning techniques does a scanner connect to an FTP server and request that server to start data transfer to the third system?

Options:

A.

Xmas Tree scanning

B.

TCP SYN scanning

C.

Bounce attack scanning

D.

TCP FIN scanning

Buy Now
Questions 5

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

Options:

A.

Cross site scripting

B.

Man-in-the-middle attack

C.

Cookie poisoning

D.

Computer-based social engineering

Buy Now
Questions 6

Which of the following steps are generally followed in computer forensic examinations?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Acquire

B.

Analyze

C.

Encrypt

D.

Authenticate

Buy Now
Questions 7

Fill in the blank with the appropriate layer name.

The Network layer of the OSI model corresponds to the _______________ layer of the TCP/IP model.

Options:

A.

Internet

Buy Now
Questions 8

You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS). You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish this?

Options:

A.

Copy the files to a network share on a FAT32 volume.

B.

Copy the files to a network share on an NTFS volume.

C.

Place the files in an encrypted folder. Then, copy the folder to a floppy disk.

D.

Copy the files to a floppy disk that has been formatted using Windows 2000 Professional.

Buy Now
Questions 9

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

Options:

A.

Piggybacking

B.

Hacking

C.

Session hijacking

D.

Keystroke logging

Buy Now
Questions 10

Which of the following is a source port forwarder and redirector tool?

Options:

A.

Fpipe

B.

NMAP

C.

SuperScan

D.

NSLOOKUP

Buy Now
Questions 11

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

False positive

B.

False negative

C.

True negative

D.

True positive

Buy Now
Questions 12

Which of the following statements about Discretionary Access Control List (DACL) is true?

Options:

A.

It is a rule list containing access control entries.

B.

It specifies whether an audit activity should be performed when an object attempts to access a resource.

C.

It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.

D.

It is a unique number that identifies a user, group, and computer account.

Buy Now
Questions 13

Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?

Options:

A.

Challenge Handshake Authentication Protocol (CHAP)

B.

Extensible Authentication Protocol (EAP)

C.

Open Shortest Path First (OSPF)

D.

Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

Buy Now
Questions 14

Which of the following protocols is used to query and modify information stored within the directory services?

Options:

A.

PPTP

B.

ARP

C.

PAP

D.

LDAP

Buy Now
Questions 15

Which of the following activities is used to take place after recording and registering an incident?

Options:

A.

Restoring

B.

Matching

C.

Analysis

D.

Classification

Buy Now
Questions 16

Which of the following is an international treaty that governs intellectual property?

Options:

A.

The Paris Convention

B.

The Washington Convention

C.

The Beijing Convention

D.

The Dalai Lama convention

E.

The London Convention

Buy Now
Questions 17

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For monitoring unauthorized zone transfer

B.

For preventing malware attacks on a DNS server

C.

For recording the number of queries resolved

D.

For measuring a DNS server's performance

Buy Now
Questions 18

Which of the following is the default port for Secure Shell (SSH)?

Options:

A.

TCP port 22

B.

UDP port 161

C.

UDP port 138

D.

TCP port 443

Buy Now
Questions 19

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:

A.

B-rated

B.

A-rated

C.

D-rated

D.

C-rated

Buy Now
Questions 20

Which of the following protocols work at the network layer?

Each correct answer represents a complete solution. Choose three.

Options:

A.

RIP

B.

OSPF

C.

SPX

D.

IGMP

Buy Now
Questions 21

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Collusion

B.

Eavesdropping

C.

Phishing

D.

Buffer overflow

Buy Now
Questions 22

Which of the following tabs will you click in the Internet Options dialog box to include a websites as a trusted site?

Options:

A.

Security

B.

Privacy

C.

Content

D.

General

Buy Now
Questions 23

Which of the following is the most secure method of authentication?

Options:

A.

Biometrics

B.

Username and password

C.

Smart card

D.

Anonymous

Buy Now
Questions 24

In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

Options:

A.

ARP spoofing

B.

Replay

C.

Brute force

D.

MAC duplicating

Buy Now
Questions 25

The _______ protocol allows applications to communicate across a network in a way designed to prevent eavesdropping and message forgery.

Options:

A.

PPP

B.

TCP

C.

EAP

D.

TLS

Buy Now
Questions 26

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Collusion

B.

Phishing

C.

Buffer overflow

D.

Eavesdropping

Buy Now
Questions 27

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

21

B.

443

C.

80

D.

22

Buy Now
Questions 28

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Spoofing

B.

Cryptanalysis

C.

Steganography

D.

Packet sniffing

Buy Now
Questions 29

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser 's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?

Options:

A.

The site's Web server has heavy traffic.

B.

WINS server has no NetBIOS name entry for the server.

C.

DNS entry is not available for the host name.

D.

The site's Web server is offline.

Buy Now
Questions 30

A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.

Options:

A.

Man-in-the-middle

B.

Brute force

C.

Denial of Service (DoS)

D.

Dictionary

Buy Now
Questions 31

The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from children under __ years of age without verifiable permission of a parent?

Options:

A.

15

B.

13

C.

10

D.

21

E.

18

Buy Now
Questions 32

Identify whether the given statement is true or false.

"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

Options:

A.

False

B.

True

Buy Now
Questions 33

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Data service

B.

Account service

C.

Authentication service

D.

Ticket-granting service

Buy Now
Questions 34

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:

A.

Visitors

B.

Customers

C.

Employees

D.

Hackers

Buy Now
Questions 35

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _____ layer of the OSI model.

Options:

A.

transport

Buy Now
Questions 36

You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?

Options:

A.

Enable DNS recursive queries on the DNS server.

B.

Disable DNS reverse lookup on the e-mail server.

C.

Enable DNS reverse lookup on the e-mail server.

D.

Disable DNS recursive queries on the DNS server.

Buy Now
Questions 37

Which of the following types of activities can be audited for security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Data downloading from the Internet

B.

Network logons and logoffs

C.

File and object access

D.

Printer access

Buy Now
Questions 38

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Data service

B.

Account service

C.

Authentication service

D.

Ticket-granting service

Buy Now
Questions 39

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

Options:

A.

The transport layer

B.

The session layer

C.

The application layer

D.

The presentation layer

Buy Now
Questions 40

Which of the following is not a biometrics technology for authentication?

Options:

A.

Fingerprint

B.

Voiceprint

C.

Facial geometry

D.

User password

Buy Now
Questions 41

Key escrow is a method of __________.

Options:

A.

Key renewal

B.

Key distribution

C.

Key recovery

D.

key revocation

Buy Now
Questions 42

In which of the following processes, a DNS server may return an incorrect IP address, diverting traffic to another computer?

Options:

A.

TCP FIN scanning

B.

DNS poisoning

C.

Snooping

D.

TCP SYN scanning

Buy Now
Questions 43

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

He should upgrade his antivirus program.

B.

He should restore his Windows settings.

C.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

Buy Now
Questions 44

Which of the following statements about symmetric encryption are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It is best suited for encrypting large amount of data.

B.

It is used by Data Encryption Standard (DES) to encrypt data.

C.

It uses two keys - a public key and a private key pair for data encryption.

D.

It is a relatively fast encryption method than public key encryption.

Buy Now
Questions 45

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Buy Now
Questions 46

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Knowledge-based detection

B.

Statistical anomaly detection

C.

Pattern matching detection

D.

Protocol detection

Buy Now
Questions 47

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

Options:

A.

Spoofing

B.

Auditing

C.

Shielding

D.

System hardening

Buy Now
Questions 48

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.

Backup policy

B.

Network security policy

C.

User password policy

D.

Privacy policy

Buy Now
Questions 49

Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

Options:

A.

Snooping

B.

Phishing

C.

SYN attack

D.

Spoofing

Buy Now
Questions 50

Which of the following classes of fire comes under Class C fire?

Options:

A.

Combustible metals fire

B.

Paper or wood fire

C.

Oil fire

D.

Electronic or computer fire

Buy Now
Questions 51

Which of the following statements about Denial-of-Service (DoS) attack are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It disrupts connections between two computers, preventing communications between services.

B.

It changes the configuration of the TCP/IP protocol.

C.

It saturates network resources.

D.

It disrupts services to a specific computer.

Buy Now
Questions 52

Which of the following access control models requires centralize database of user accounts?

Options:

A.

User based

B.

Data based

C.

Group based

D.

Partitions based

Buy Now
Questions 53

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Assuring the integrity of organizational data

B.

Building Risk free systems

C.

Risk control

D.

Risk identification

Buy Now
Questions 54

Brutus is a password cracking tool that can be used to crack the following authentications:

•HTTP (Basic Authentication)

•HTTP (HTML Form/CGI)

•POP3 (Post Office Protocol v3)

•FTP (File Transfer Protocol)

•SMB (Server Message Block)

•Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dictionary attack

B.

Brute force attack

C.

Replay attack

D.

Hybrid attack

E.

Man-in-the-middle attack

Buy Now
Questions 55

Which of the following services is provided by the message authentication code (MAC) ?

Options:

A.

Data recovery

B.

Integrity

C.

Fault tolerance

D.

Key recovery

Buy Now
Questions 56

Mark works as a Webmaster for Infonet Inc. He sets up an e-commerce site. He wants to accept online payments through credit cards on this site. He wants the credit card numbers to be encrypted. What will Mark do to accomplish the task?

Options:

A.

Use PGP.

B.

Use HTTP.

C.

Use MIME.

D.

Use SET.

Buy Now
Questions 57

Which of the following conditions the line to keep voltage steady and clean?

Options:

A.

Power regulator

B.

Demilitarized zone (DMZ)

C.

Transponder

D.

Smoke detector

Buy Now
Questions 58

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?

Options:

A.

Microsoft Point-to-Point Encryption (MPPE)

B.

Pretty Good Privacy (PGP)

C.

Data Encryption Standard (DES)

D.

IP Security (IPSec)

Buy Now
Questions 59

Which of the following is generally practiced by the police or any other recognized governmental authority?

Options:

A.

SMB signing

B.

Phishing

C.

Spoofing

D.

Wiretapping

Buy Now
Questions 60

In which of the following does a Web site store information such as user preferences to provide customized services to users?

Options:

A.

ActiveX control

B.

Keyword

C.

Protocol

D.

Cookie

Buy Now
Questions 61

Which of the following statements best describes VeriSign?

Options:

A.

It is a signature verification utility.

B.

It is a certification authority.

C.

It is an encryption technology.

D.

It is an authentication server.

Buy Now
Questions 62

Which of the following ports is used by a BOOTP server?

Options:

A.

UDP port 389

B.

UDP port 67

C.

TCP port 80

D.

TCP port 110

Buy Now
Questions 63

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

Options:

A.

Packaging

B.

Spoofing

C.

Eavesdropping

D.

Shielding

Buy Now
Questions 64

You work as a Web Administrator for Perfect World Inc. The company is planning to host an Ecommerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Use the EAP protocol.

B.

Use the SSL protocol.

C.

Use Basic authentication.

D.

Use encrypted authentication.

Buy Now
Questions 65

Which of the following is the default port for TACACS?

Options:

A.

UDP port 49

B.

TCP port 443

C.

TCP port 25

D.

TCP port 80

Buy Now
Questions 66

Which of the following is required to be backed up on a domain controller to recover Active Directory?

Options:

A.

Installed third party application's folders

B.

User's personal data

C.

Operating System files

D.

System state data

Buy Now
Questions 67

Which of the following are the goals of the cryptographic systems?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Availability

B.

Authentication

C.

Integrity

D.

Confidentiality

Buy Now
Questions 68

Which of the following statements about Public Key Infrastructure (PKI) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses symmetric key pairs.

B.

It uses asymmetric key pairs.

C.

It provides security using data encryption and digital signature.

D.

It is a digital representation of information that identifies users.

Buy Now
Questions 69

Which of the following performs packet screening for security on the basis of port numbers?

Options:

A.

Switch

B.

DNS

C.

Hub

D.

Firewall

Buy Now
Questions 70

Which of the following VPN protocols offer encryption?

Each correct answer represents a complete solution. Choose two.

Options:

A.

L2F

B.

PPTP

C.

L2TP

D.

IPSec

Buy Now
Questions 71

Which of the following services does Internet Information Server (IIS) provide along with HTTP?

Each correct answer represents a complete solution. Choose three.

Options:

A.

SMTP

B.

FTP

C.

PPTP

D.

NNTP

Buy Now
Questions 72

Which of the following is used by the Diffie-Hellman encryption algorithm?

Options:

A.

Password

B.

Access control entry

C.

Key exchange

D.

Access control list

Buy Now
Questions 73

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

Options:

A.

Bridge

B.

Antivirus software

C.

Gateway

D.

Firewall

Buy Now
Questions 74

Which of the following classes of fire comes under Class C fire?

Options:

A.

Combustible metals fire

B.

Paper or wood fire

C.

Oil fire

D.

Electronic or computer fire

Buy Now
Questions 75

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.

IEEE 802.4

B.

IEEE 802.11b

C.

IEEE 802.5

D.

IEEE 802.3

Buy Now
Questions 76

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:

•Gathering information

•Determining the network range

•Identifying active systems

Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

Options:

A.

ARIN

B.

APNIC

C.

SuperScan

D.

RIPE

Buy Now
Questions 77

Which of the following techniques are used to secure wireless networks?

Each correct answer represents a complete solution. Choose three.

Options:

A.

MAC address filtering

B.

SSID spoofing

C.

IP spoofing

D.

Closed network

Buy Now
Questions 78

Which of the following statements about role-based access control (RBAC) model is true?

Options:

A.

In this model, a user can access resources according to his role in the organization.

B.

In this model, the permissions are uniquely assigned to each user account.

C.

In this model, the same permission is assigned to each user account.

D.

In this model, the users can access resources according to their seniority.

Buy Now
Questions 79

Which of the following is a name, symbol, or slogan with which a product is identified?

Options:

A.

Trademark

B.

Patent

C.

Trade secret

D.

Copyright

Buy Now
Questions 80

Which of the following tools can be used to perform polymorphic shell code attacks?

Options:

A.

TrueCrypt

B.

Fragroute

C.

Mendax

D.

ADMutate

Buy Now
Questions 81

Which of the following reads and writes data across network connections by using the TCP/IP protocol?

Options:

A.

Netcat

B.

NSLOOKUP

C.

2Mosaic

D.

Fpipe

Buy Now
Questions 82

Which of the following statements about digital signature are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It identifies a user who sends a message.

B.

It is created by implementing a public-key encryption.

C.

It is created by implementing a private-key encryption.

D.

It identifies a user who deletes a message.

Buy Now
Questions 83

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Spoofing

B.

Cryptanalysis

C.

Steganography

D.

Packet sniffing

Buy Now
Questions 84

Which of the following languages is a fourth-generation language?

Options:

A.

FORTRAN

B.

Assembly

C.

C+

D.

SQL

Buy Now
Questions 85

In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

Options:

A.

ARP spoofing

B.

Replay

C.

Brute force

D.

MAC duplicating

Buy Now
Questions 86

Which of the following terms is synonymous with the willful destruction of another person's property?

Options:

A.

Hacking

B.

Vandalism

C.

Spoofing

D.

Phishing

Buy Now
Questions 87

Which of the following protocols is used to retrieve e-mails from a remote mail server?

Options:

A.

SNMP

B.

POP3

C.

SMTP

D.

IGMP

Buy Now
Questions 88

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.

B.

It uses TCP port 80 as the default port.

C.

It uses TCP port 443 as the default port.

D.

It is a protocol used to provide security for a database server in an internal network.

Buy Now
Questions 89

Which of the following is used in asymmetric encryption?

Options:

A.

Public key and user key

B.

Public key and private key

C.

SSL

D.

NTFS

Buy Now
Questions 90

Which of the following terms refers to a momentary low voltage?

Options:

A.

Blackout

B.

Spike

C.

Noise

D.

Sag

Buy Now
Questions 91

Where are user accounts and passwords stored in a decentralized privilege management environment?

Options:

A.

On each server.

B.

On a central authentication server.

C.

On more than one server.

D.

On a server configured for decentralized privilege management.

Buy Now
Questions 92

Which of the following are threats to network security?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Dial-up connections

B.

Rogue employees

C.

Disabled user accounts

D.

Events auditing

Buy Now
Questions 93

Which of the following uses a tunneling protocol?

Options:

A.

Firewall

B.

Internet

C.

LAN

D.

VPN

Buy Now
Questions 94

Which of the following are default ports for the FTP service?

Each correct answer represents a complete solution. Choose two.

Options:

A.

443

B.

20

C.

21

D.

80

Buy Now
Questions 95

Which of the following statements about Encapsulating Security Payload (ESP) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It can also be nested with the Layer Two Tunneling Protocol (L2TP).

B.

It is an IPSec protocol.

C.

It uses TCP port 22 as the default port and operates at the application layer.

D.

It is a text-based communication protocol.

Buy Now
Questions 96

Which of the following statements regarding Secure Sockets Layer (SSL) are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SSL provides message integrity to prevent alteration to the message.

B.

SSL can process credit cards.

C.

During SSL session, information is encrypted to prevent unauthorized disclosure.

D.

SSL can support 128-bit encryption.

Buy Now
Questions 97

Which of the following types of fire comes under Class K fire?

Options:

A.

Cooking oil fire

B.

Electrical fire

C.

Wooden fire

D.

Combustible metal fire

Buy Now
Questions 98

Which of the following statements about packet filtering is true?

Options:

A.

It is used to store information about confidential data.

B.

It is used to send confidential data on the public network.

C.

It allows or restricts the flow of encrypted packets to provide security.

D.

It allows or restricts the flow of specific types of packets to provide security.

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Nov 21, 2024
Questions: 659
GISP pdf

GISP PDF

$28  $80
GISP Engine

GISP Testing Engine

$33.25  $95
GISP PDF + Engine

GISP PDF + Testing Engine

$45.5  $130