GIAC GISP Exam Practice Questions (P. 3)
- Full Access (654 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
is true?
- AIt is an ICMP attack that involves spoofing and flooding.
- BIt is a UDP attack that involves spoofing and flooding.
- CIt is a denial of service (DoS) attack that leaves TCP ports open.
- DIt is an attack with IP fragments that cannot be reassembled.
Correct Answer:
A
A
send
light_mode
delete
Question #22
Which of the following policies is set by a network administrator to allow users to keep their emails and documents for a fixed period of time?
send
light_mode
delete
Question #23
are true?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
- AIt is a logical connection between two devices.
- BIt uses fixed-length (53-byte) packets to transmit information.
- CIt supports speeds of 1.544 Mbps over Digital Signal level 1 (DS-1) transmission facilities.
- DIt is a high-speed WAN networking technology used for communication over public data networks
Correct Answer:
CD
CD
send
light_mode
delete
Question #24
Which of the following terms refers to the protection of data against unauthorized access?
send
light_mode
delete
Question #26
attack?
- AUpdating the anti-virus software regularly.
- BTaking daily backup of data.
- CUsing strong passwords to log on to the network.
- DImplementing a firewall.
Correct Answer:
A
A
send
light_mode
delete
Question #27
?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
- AIt hides vulnerable computers that are exposed to the Internet.
- BIt logs traffic to and from the private network.
- CIt enhances security through various methods, including packet filtering, circuit-level filtering, and application filtering.
- DIt blocks unwanted traffic.
Correct Answer:
ABCD
ABCD
send
light_mode
delete
Question #28
are true?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
- AIn Digest authentication, passwords are sent across a network as clear text, rather than as a has value.
- BDigest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.
- CIn Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.
- DDigest authentication is a more secure authentication method as compared to Basic authentication.
Correct Answer:
CD
CD
send
light_mode
delete
Question #29
Which of the following types of attacks slows down or stops a server by overloading it with requests?
- AVulnerability attack
- BImpersonation attack
- CNetwork attack
- DDoS attack
Correct Answer:
D
D
send
light_mode
delete
Question #30
Which of the following is the most secure authentication method?
- ACertificate-based authentication
- BBasic authentication
- CDigest authentication
- DIntegrated Windows authentication
Correct Answer:
A
A
send
light_mode
delete
All Pages