[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 231-240

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 231 – (Topic 2)

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

  1. Cryptanalysis

  2. Kerberos

  3. Cryptographer

  4. Cryptography

Answer: A

Question No: 232 – (Topic 2)

Which of the following is used by the Diffie-Hellman encryption algorithm?

  1. Password

  2. Access control entry

  3. Key exchange

  4. Access control list

Answer: C

Question No: 233 – (Topic 2)

Which of the following provides secure online payment services?

  1. CA

  2. IEEE

  3. ACH

  4. ICSA

Answer: C

Question No: 234 – (Topic 2)

John works as an Ethical Hacker for PassGuide Inc. He wants to find out the ports that are open in PassGuide#39;s server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?

  1. TCP SYN

  2. TCP SYN/ACK

  3. TCP FIN

  4. Xmas tree

Answer: A

Question No: 235 – (Topic 2)

Which of the following statements about the Instant messaging programs are true? Each correct answer represents a complete solution. Choose all that apply.

  1. Most of the programs have no encryption facility.

  2. They allow effective and efficient communication and immediate receipt of reply.

  3. They provide secure password management.

  4. They can bypass corporate firewalls.

Answer: A,B,D

Question No: 236 – (Topic 2)

Which of the following tools is used to flood the local network with random MAC addresses?

  1. NETSH

  2. NMAP

  3. Port scanner

  4. Macof

Answer: D

Question No: 237 – (Topic 2)

Mark works as a Webmaster for Infonet Inc. He sets up an e-commerce site. He wants to accept online payments through credit cards on this site. He wants the credit card numbers to be encrypted. What will Mark do to accomplish the task?

  1. Use PGP.

  2. Use HTTP.

  3. Use MIME.

  4. Use SET.

Answer: D

Question No: 238 – (Topic 2)

Which of the following layers protocols handles file transfer and network management?

  1. Application

  2. Transport

  3. Presentation

  4. Session

Answer: A

Question No: 239 – (Topic 2)

Fill in the blank with the appropriate value.

Twofish symmetric key block cipher operates on 128-bits block size using key sizes up to bits.

A. 256

Answer: A

Question No: 240 – (Topic 2)

Which of the following protects from electrical and magnetic induction that causes interference to the power voltage?

  1. Power regulator

  2. Shielded line

  3. Firewall

  4. Smoke detector

Answer: B

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE