[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 11-20

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 11 – (Topic 1)

Which of the following statements about a fiber-optic cable are true? Each correct answer represents a complete solution. Choose three.

  1. It is immune to electromagnetic interference (EMI).

  2. It can transmit undistorted signals over great distances.

  3. It has eight wires twisted into four pairs.

  4. It uses light pulses for signal transmission.

Answer: A,B,D

Question No: 12 – (Topic 1)

Which of the following statements about the bridge are true? Each correct answer represents a complete solution. Choose two.

  1. It filters traffic based on IP addresses.

  2. It forwards broadcast packets.

  3. It assigns a different network address per port.

  4. It filters traffic based on MAC addresses.

Answer: B,D

Question No: 13 – (Topic 1)

Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a

Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?

  1. Proxy server

  2. Security

  3. Cookies

  4. Certificate

Answer: B

Question No: 14 – (Topic 1)

Which of the following are used to suppress paper or wood fires? Each correct answer represents a complete solution. Choose two.

  1. Water

  2. Kerosene

  3. CO2

  4. Soda acid

Answer: A,D

Question No: 15 – (Topic 1)

Which of the following steps can be taken to protect laptops and data they hold? Each correct answer represents a complete solution. Choose all that apply.

  1. Use slot locks with cable to connect the laptop to a stationary object.

  2. Keep inventory of all laptops including serial numbers.

  3. Harden the operating system.

  4. Encrypt all sensitive data.

Answer: A,B,C,D

Question No: 16 – (Topic 1)

Which of the following attacks involves multiple compromised systems to attack a single target?

  1. Brute force attack

  2. DDoS attack

  3. Dictionary attack

  4. Replay attack

Answer: B

Question No: 17 – (Topic 1)

Which of the following statements about DMZ are true?

Each correct answer represents a complete solution. Choose two.

  1. It is an anti-virus software that scans the incoming traffic on an internal network.

  2. It is the boundary between the Internet and a private network.

  3. It contains company resources that are available on the Internet, such as Web servers and FTP servers.

  4. It contains an access control list (ACL).

Answer: B,C

Question No: 18 – (Topic 1)

Which of the following protocols is used to establish a secure TELNET session over TCP/IP?

  1. SSL

  2. PGP

  3. IPSEC

  4. SSH

Answer: D

Question No: 19 – (Topic 1)

Which methods help you to recover your data in the event of a system or hard disk failure? Each correct answer represents a complete solution. Choose two.

  1. Install a RAID system

  2. Use data encryption

  3. Install and use a tape backup unit

  4. Install UPS systems on all important devices

Answer: A,C

Question No: 20 – (Topic 1)

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as .

  1. False positive

  2. False negative

  3. True negative

  4. True positive

Answer: A

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE