[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 161-170

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 161 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the preattack phase successfully:

鈥nformation gathering

鈥etermination of network range

鈥dentification of active systems

鈥ocation of open ports and applications

Now, which of the following tasks should he perform next?

  1. Install a backdoor to log in remotely on the We-are-secure server.

  2. Map the network of We-are-secure Inc.

  3. Fingerprint the services running on the we-are-secure network.

  4. Perform OS fingerprinting on the We-are-secure network.

Answer: D

Question No: 162 – (Topic 2)

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company#39;s network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

  1. Bridge

  2. Antivirus software

  3. Gateway

  4. Firewall

Answer: D

Question No: 163 – (Topic 2)

Which of the following statements about a perimeter network are true? Each correct answer represents a complete solution. Choose three.

  1. It has a connection to the Internet through an external firewall and a connection to an internal network through an interior firewall.

  2. It has a connection to a private network through an external firewall and a connection to an internal network through an interior firewall.

  3. It is also known as a demilitarized zone or DMZ.

  4. It prevents access to the internal corporate network for outside users.

Answer: A,C,D

Question No: 164 – (Topic 2)

Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?

  1. Spam

  2. Artistic license

  3. Patent

  4. Phishing

Answer: C

Question No: 165 – (Topic 2)

You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer#39;s log:

45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72

Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?

  1. 16, ICMP

  2. 41, TCP

  3. 16, UDP

  4. 41, UDP

Answer: B

Question No: 166 – (Topic 2)

Which of the following attacks is specially used for cracking a password?

  1. DoS attack

  2. PING attack

  3. Dictionary attack

  4. Vulnerability attack

Answer: C

Question No: 167 – (Topic 2)

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?

  1. Microsoft Point-to-Point Encryption (MPPE)

  2. Pretty Good Privacy (PGP)

  3. Data Encryption Standard (DES)

  4. IP Security (IPSec)

Answer: D

Question No: 168 – (Topic 2)

In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

  1. Ciphertext only attack

  2. Chosen ciphertext attack

  3. Known plaintext attack

  4. Chosen plaintext attack

Answer: A

Question No: 169 – (Topic 2)

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

  1. Worm

  2. Biometrics

  3. Denial-of-Service (DoS)

  4. Trojan horse

Answer: A,D

Question No: 170 – (Topic 2)

Which of the following devices performs protocol and format translations?

  1. Switch

  2. Modem

  3. Gateway

  4. Repeater

Answer: C

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE