[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 271-280

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 271 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

  1. TCP FTP proxy scanning

  2. Eavesdropping

  3. Web ripping

  4. Fingerprinting

Answer: C

Question No: 272 – (Topic 2)

Which of the following is required to be backed up on a domain controller to recover Active Directory?

  1. Installed third party application#39;s folders

  2. User#39;s personal data

  3. Operating System files

  4. System state data

Answer: D

Question No: 273 – (Topic 2)

Fill in the blanks with the appropriate values.

International Data Encryption Algorithm (IDEA) is a -bit block cipher that uses a

-bit key.

A. 64,128

Answer: A

Question No: 274 – (Topic 2)

Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.

  1. Password policies

  2. Vulnerability assessments

  3. Data classification

  4. Data encryption

Answer: A,B,C

Question No: 275 – (Topic 2)

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

  1. Packaging

  2. Spoofing

  3. Eavesdropping

  4. Shielding

Answer: C

Question No: 276 – (Topic 2)

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e- mails.

Which of the following will you use to accomplish this?

  1. IPSec

  2. PGP

  3. PPTP

  4. NTFS

Answer: B

Question No: 277 – (Topic 2)

Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?

  1. Denial-of-Service (DoS) attack

  2. Impersonation attack

  3. Vulnerability attack

  4. Man-in-the-middle attack

Answer: A

Question No: 278 – (Topic 2)

You work in a company that accesses the Internet frequently. This makes the company#39;s files susceptible to attacks from unauthorized access. You want to protect your company#39;s network from external attacks. Which of the following options will help you in achieving your aim?

  1. HTTP

  2. FTP

  3. Firewall

  4. Gopher

Answer: C

Question No: 279 – (Topic 2)

Which of the following works at the network layer and hides the local area network IP address and topology?

  1. Hub

  2. MAC address

  3. Network address translation (NAT)

  4. Network interface card (NIC)

Answer: C

Question No: 280 – (Topic 2)

Which of the following statements about a bastion host is true?

  1. It is a computer that is used to resolve the NetBIOS name to an IP address.

  2. It is a computer that is used to resolve the host name to an IP address.

  3. It is a computer that is accessible from the Internet to collect information about internal networks.

  4. It is a computer that must be made secure because it is accessible from the Internet and hence is more vulnerable to attacks.

Answer: D

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE