[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 191-200

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 191 – (Topic 2)

Which of the following terms refers to the process in which headers and trailers are added around user data?

  1. Encryption

  2. Encapsulation

  3. Authentication

  4. Authorization

Answer: B

Question No: 192 – (Topic 2)

Fill in the blank with the appropriate value.

International Data Encryption Algorithm (IDEA) operates on 64-bit blocks using a

-bit key.

A. 128

Answer: A

Question No: 193 – (Topic 2)

Which of the following are types of social engineering attacks?

Each correct answer represents a complete solution. Choose two.

  1. An unauthorized person gains entrance to the building where the company#39;s database server resides and accesses the server by pretending to be an employee.

  2. An unauthorized person inserts an intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts.

  3. An unauthorized person calls a user and pretends to be a system administrator in order to get the user#39;s password.

  4. An unauthorized person modifies packet headers by using someone else#39;s IP address to hide his identity.

Answer: A,C

Question No: 194 – (Topic 2)

Which of the following is the default port for TACACS?

  1. UDP port 49

  2. TCP port 443

  3. TCP port 25

  4. TCP port 80

Answer: A

Question No: 195 – (Topic 2)

Which of the following is generally practiced by the police or any other recognized governmental authority?

  1. SMB signing

  2. Phishing

  3. Spoofing

  4. Wiretapping

Answer: D

Question No: 196 – (Topic 2)

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

  1. Chain of custody

  2. Evidence access policy

  3. Chain of evidence

  4. Incident response policy

Answer: A

Question No: 197 – (Topic 2)

Which of the following are the primary components of a discretionary access control (DAC)

model?

Each correct answer represents a complete solution. Choose two.

  1. User#39;s group

  2. Access rights and permissions

  3. File and data ownership

  4. Smart card

Answer: B,C

Question No: 198 – (Topic 2)

Which of the following ensures that a sender cannot deny sending a message?

  1. Authentication

  2. Snooping

  3. Spoofing

  4. Non repudiation

Answer: D

Question No: 199 – (Topic 2)

Which of the following protocols work at the network layer?

Each correct answer represents a complete solution. Choose three.

  1. OSPF

  2. SPX

  3. IGMP

  4. RIP

Answer: A,C,D

Question No: 200 – (Topic 2)

Which of the following is executed when a predetermined event occurs?

  1. Worm

  2. Trojan horse

  3. Logic bomb

  4. MAC

Answer: C

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE