[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 261-270

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 261 – (Topic 2)

Which of the following provides high availability of data?

  1. RAID

  2. Anti-virus software

  3. Backup

  4. EFS

Answer: A

Question No: 262 – (Topic 2)

SSL session keys are available in which of the following lengths?

  1. 64-bit and 128-bit.

  2. 40-bit and 64-bit.

  3. 128-bit and 1,024-bit.

  4. 40-bit and 128-bit.

Answer: D

Question No: 263 – (Topic 2)

Which of the following protocols is used to provide security for wireless local area networks (WLANs)?

  1. WEP

  2. EAP

  3. NAT

  4. TLS

Answer: A

Question No: 264 – (Topic 2)

You work as a Web Administrator for Perfect World Inc. The company is planning to host an Ecommerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it?

Each correct answer represents a part of the solution. Choose two.

  1. Use the EAP protocol.

  2. Use the SSL protocol.

  3. Use Basic authentication.

  4. Use encrypted authentication.

Answer: B,D

Question No: 265 – (Topic 2)

Which of the following statements about a smart card are true? Each correct answer represents a complete solution. Choose two.

  1. It is used to securely store public and private keys for log on , e-mail signing and encryption, and file encryption.

  2. It is a device that routes data packets between computers in different networks.

  3. It is a device that contains a microprocessor and permanent memory.

  4. It is a device that works as an interface between a computer and a network.

Answer: A,C

Question No: 266 – (Topic 2)

In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization#39;s network?

  1. Remote dial-up network

  2. Remote network

  3. Stolen equipment

  4. Local network

Answer: D

Question No: 267 – (Topic 2)

Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.

  1. Data downloading from the Internet

  2. File and object access

  3. Network logons and logoffs

  4. Printer access

Answer: B,C,D

Question No: 268 – (Topic 2)

Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.

  1. It typically executes at a higher speed than a block cipher.

  2. It typically executes at a slower speed than a block cipher.

  3. It divides a message into blocks for processing.

  4. It divides a message into bits for processing.

  5. It is a symmetric key cipher.

Answer: A,D,E

Question No: 269 – (Topic 2)

Which of the following are the goals of risk management?

Each correct answer represents a complete solution. Choose three.

  1. Identifying the risk

  2. Assessing the impact of potential threats

  3. Finding an economic balance between the impact of the risk and the cost of the countermeasure

  4. Identifying the accused

Answer: A,B,C

Question No: 270 – (Topic 2)

Which of the following services are provided by Remote Authentication Dial-In User Service

(RADIUS)?

Each correct answer represents a complete solution. Choose three.

  1. Authentication

  2. Data encryption

  3. Authorization

  4. Accounting

Answer: A,C,D

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE