GIAC GISP Exam Practice Questions (P. 2)
- Full Access (654 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
cable are true?
Each correct answer represents a complete solution. Choose three.
Each correct answer represents a complete solution. Choose three.
- AIt is immune to electromagnetic interference (EMI).
- BIt can transmit undistorted signals over great distances.
- CIt has eight wires twisted into four pairs.
- DIt uses light pulses for signal transmission.
Correct Answer:
ABD
ABD
send
light_mode
delete
Question #12
Which of the following statements about the bridge are true?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
- AIt filters traffic based on IP addresses.
- BIt forwards broadcast packets.
- CIt assigns a different network address per port.
- DIt filters traffic based on MAC addresses.
Correct Answer:
BD
BD
send
light_mode
delete
Question #13
Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?
send
light_mode
delete
Question #14
Which of the following are used to suppress paper or wood fires?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
send
light_mode
delete
Question #15
Which of the following steps can be taken to protect laptops and data they hold?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
- AUse slot locks with cable to connect the laptop to a stationary object.
- BKeep inventory of all laptops including serial numbers.
- CHarden the operating system.
- DEncrypt all sensitive data.
Correct Answer:
ABCD
ABCD
send
light_mode
delete
Question #16
Which of the following attacks involves multiple compromised systems to attack a single target?
send
light_mode
delete
Question #17
are true?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
- AIt is an anti-virus software that scans the incoming traffic on an internal network.
- BIt is the boundary between the Internet and a private network.
- CIt contains company resources that are available on the Internet, such as Web servers and FTP servers.
- DIt contains an access control list (ACL).
Correct Answer:
BC
BC
send
light_mode
delete
Question #18
Which of the following protocols is used to establish a secure TELNET session over TCP/IP?
send
light_mode
delete
Question #19
Which methods help you to recover your data in the event of a system or hard disk failure?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
- AInstall a RAID system
- BUse data encryption
- CInstall and use a tape backup unit
- DInstall UPS systems on all important devices
Correct Answer:
AC
AC
send
light_mode
delete
Question #20
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.
send
light_mode
delete
All Pages