GIAC GISP Exam Practice Questions (P. 5)
- Full Access (654 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
are true?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
- AIt can detect events scattered over the network.
- BIt is a technique that allows multiple computers to share one or more IP addresses.
- CIt cannot detect events scattered over the network.
- DIt can handle encrypted and unencrypted traffic equally.
Correct Answer:
CD
CD
send
light_mode
delete
Question #42
You work as a professional Ethical Hacker. You are assigned a project to test the security of www.we-are-secure.com. You are working on the Windows Server
2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?
Each correct answer represents a complete solution. Choose all that apply.
2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?
Each correct answer represents a complete solution. Choose all that apply.
- AUse on-screen keyboards and speech-to-text conversion software which can also be useful agains keyloggers, as there are no typing or mouse movements involved.
- BRemove the SNMP agent or disable the SNMP service.
- CUse commercially available anti-keyloggers such as PrivacyKeyboard.
- DMonitor the programs running on the server to see whether any new process is running on the server or not.
Correct Answer:
ACD
ACD
send
light_mode
delete
Question #43
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
send
light_mode
delete
Question #44
Which of the following protocols work at the data-link layer?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
send
light_mode
delete
Question #45
Which of the following terms refers to the method that allows or restricts specific types of
packets from crossing over the firewall?
packets from crossing over the firewall?
- AWeb caching
- BHacking
- CPacket filtering
- DSpoofing
Correct Answer:
C
The Firewall mechanism of operation is inspecting and filtering packets by policy.
C
The Firewall mechanism of operation is inspecting and filtering packets by policy.
send
light_mode
delete
Question #46
Which of the following encryption methods comes under symmetric encryption algorithm?
Each correct answer represents a complete solution. Choose three.
Each correct answer represents a complete solution. Choose three.
send
light_mode
delete
Question #47
SIMULATION -
Fill in the blank with the appropriate term.
A ___________ is a digital representation of information that identifies authorized users on the Internet and intranets.
Fill in the blank with the appropriate term.
A ___________ is a digital representation of information that identifies authorized users on the Internet and intranets.
send
light_mode
delete
Question #48
Which of the following defines the communication link between a Web server and Web applications?
send
light_mode
delete
Question #49
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by
John?
Each correct answer represents a complete solution. Choose all that apply.
John?
Each correct answer represents a complete solution. Choose all that apply.
- AThe mutation engine of the virus is generating a new encrypted code.
- BJohn has changed the signature of the virus.
- CThe virus, used by John, is not in the database of the antivirus program installed on the server.
- DJohn has created a new virus.
Correct Answer:
ABCD
ABCD
send
light_mode
delete
Question #50
Which of the following are the centralized administration technologies?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
send
light_mode
delete
All Pages