[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 201-210

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 201 – (Topic 2)

Which of the following types of computers is used for attracting potential intruders?

  1. Honey pot

  2. Bastion host

  3. Data pot

  4. Files pot

Answer: A

Question No: 202 – (Topic 2)

You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the

access point of the network?

  1. Only users within the company.

  2. Anyone can authenticate.

  3. Only users with the correct WEP key.

  4. Only the administrator.

Answer: C

Question No: 203 – (Topic 2)

Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

  1. Sanitization

  2. Cryptography

  3. Hardening

  4. Authentication

Answer: C

Question No: 204 – (Topic 2)

Which of the following statements about Dynamic Host Configuration Protocol (DHCP) are true?

Each correct answer represents a complete solution. Choose two.

  1. It is used to provide host name resolution in a TCP/IP-based network.

  2. It is used to dynamically assign IP addresses to computers.

  3. It reduces the complexity of managing network client IP address configuration.

  4. It reduces the risk of a denial of service (DoS) attack.

Answer: B,C

Question No: 205 – (Topic 2)

Which of the following two components does Kerberos Key Distribution Center (KDC)

consist of?

Each correct answer represents a complete solution. Choose two.

  1. Data service

  2. Account service

  3. Ticket-granting service

  4. Authentication service

Answer: C,D

Question No: 206 – (Topic 2)

Which of the following is used for secure financial transactions over the Internet?

  1. VPN

  2. ATM

  3. SSL

  4. SET

Answer: D

Question No: 207 – (Topic 2)

Which of the following encryption algorithms are based on stream ciphers? Each correct answer represents a complete solution. Choose two.

  1. RC4

  2. FISH

  3. Blowfish

  4. Twofish

Answer: A,B

Question No: 208 – (Topic 2)

Which of the following is the most secure policy for a firewall?

  1. Passing all packets unless they are explicitly rejected.

  2. Enabling all internal interfaces.

  3. Blocking all packets unless they are explicitly permitted.

  4. Disabling all external interfaces.

Answer: C

Question No: 209 – (Topic 2)

Which of the following is an attack with IP fragments that cannot be reassembled?

  1. Teardrop attack

  2. Dictionary attack

  3. Password guessing attack

  4. Smurf attack

Answer: A

Question No: 210 – (Topic 2)

You work as a Web Developer for WebCrunch Inc. You create a web site that contains information about the company#39;s products and services. The web site is to be used by the company#39;s suppliers only. Which of the following options will you use to specify the nature of access to the web site?

  1. Intranet

  2. Internet and Intranet

  3. Internet

  4. Extranet

Answer: D

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE