[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 151-160

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 151 – (Topic 2)

Which of the following statements about IEEE 802.1X standard are true? Each correct answer represents a complete solution. Choose two.

  1. It uses the Point-to-Point Tunneling Protocol (PPTP) that works on Ethernet, Token Ring, or wireless LANs to exchange messages for the authentication process.

  2. It uses the Extensible Authentication Protocol (EAP) that works on Ethernet, Token Ring, or wireless LANs to exchange messages for the authentication process.

  3. It provides an authentication framework for wireless LANs.

  4. It provides the highest level of VPN security.

Answer: B,C

Question No: 152 – (Topic 2)

Which of the following needs to be documented to preserve evidences for presentation in

court?

  1. Incident response policy

  2. Separation of duties

  3. Chain of custody

  4. Account lockout policy

Answer: C

Question No: 153 – (Topic 2)

Fill in the blank with the appropriate value.

SHA-1 produces a -bit message digest.

A. 160

Answer: A

Question No: 154 – (Topic 2)

Which of the following statements about asymmetric encryption are true? Each correct answer represents a complete solution. Choose two.

  1. Asymmetric encryption uses a public key and a private key pair for data encryption.

  2. Asymmetric encryption is faster as compared to symmetric encryption.

  3. In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.

  4. In asymmetric encryption, only one key is needed to encrypt and decrypt data.

Answer: A,C

Question No: 155 – (Topic 2)

Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?

  1. LMHOSTS

  2. Bastion host

  3. Firewall

  4. Gateway

Answer: B

Question No: 156 – (Topic 2)

What are the benefits of using a proxy server on a network?

Each correct answer represents a complete solution. Choose all that apply.

  1. It enhances network security.

  2. It cuts down dial-up charges.

  3. It is used for automated assignment of IP addresses to a TCP/IP client in the domain.

  4. It uses a single registered IP address for multiple connections to the Internet.

Answer: A,D

Question No: 157 – (Topic 2)

Which of the following are the goals of the cryptographic systems? Each correct answer represents a complete solution. Choose three.

  1. Availability

  2. Authentication

  3. Integrity

  4. Confidentiality

Answer: B,C,D

Question No: 158 – (Topic 2)

Which of the following services is provided by the message authentication code (MAC) ?

  1. Data recovery

  2. Integrity

  3. Fault tolerance

  4. Key recovery

Answer: B

Question No: 159 – (Topic 2)

Which of the following statements best describes VeriSign?

  1. It is a signature verification utility.

  2. It is a certification authority.

  3. It is an encryption technology.

  4. It is an authentication server.

Answer: B

Question No: 160 – (Topic 2)

Which of the following protocols is responsible for the resolution of IP addresses to media access control (MAC) addresses?

  1. ARP

  2. PPP

  3. ICMP

  4. HTTP

Answer: A

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE