GIAC GISP Exam Practice Questions (P. 4)
- Full Access (654 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #31
Which of the following practices come in the category of denial of service attack?
Each correct answer represents a complete solution. Choose three.
Each correct answer represents a complete solution. Choose three.
- ASending lots of ICMP packets to an IP address
- BDisrupting services to a specific computer
- CPerforming Back door attack on a system
- DSending thousands of malformed packets to a network for bandwidth consumption
Correct Answer:
ABD
ABD
send
light_mode
delete
Question #32
stand for?
- ARivest-Shamir-Adleman
- BRead System Authority
- CRivest-System-Adleman
- DRemote System Authority
Correct Answer:
A
A
send
light_mode
delete
Question #33
Which of the following authentication methods support mutual authentication?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
send
light_mode
delete
Question #34
SIMULATION -
Fill in the blank with the appropriate layer name.
The Network layer of the OSI model corresponds to the _______________ layer of the TCP/IP model.
Fill in the blank with the appropriate layer name.
The Network layer of the OSI model corresponds to the _______________ layer of the TCP/IP model.
send
light_mode
delete
Question #35
Which of the following are the application layer protocols for security?
Each correct answer represents a complete solution. Choose three.
Each correct answer represents a complete solution. Choose three.
- ASecure Hypertext Transfer Protocol (S-HTTP)
- BSecure Sockets Layer (SSL)
- CSecure Electronic Transaction (SET)
- DSecure Shell (SSH)
Correct Answer:
ACD
ACD
send
light_mode
delete
Question #36
John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?
- ASession splicing attack
- BEvasion attack
- CInsertion attack
- DPolymorphic shell code attack
Correct Answer:
D
D
send
light_mode
delete
Question #37
Which of the following types of attacks is only intended to make a computer resource unavailable to its users?
- ATeardrop attack
- BDenial of Service attack
- CLand attack
- DReplay attack
Correct Answer:
B
B
send
light_mode
delete
Question #38
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?
send
light_mode
delete
Question #39
Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?
send
light_mode
delete
Question #40
components?
Each correct answer represents a complete solution. Choose three.
Each correct answer represents a complete solution. Choose three.
send
light_mode
delete
All Pages