[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 281-290

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 281 – (Topic 2)

Which of the following is the main reason for implementing CCTV as part of the physical arrangement?

  1. Authenticating users

  2. Securing data

  3. Increasing guard visibility

  4. Preventing criminal activities

Answer: C

Question No: 282 – (Topic 2)

Which of the following is a reason to implement security logging on a DNS server?

  1. For measuring a DNS server#39;s performance

  2. For recording the number of queries resolved

  3. For preventing malware attacks on a DNS server

  4. For monitoring unauthorized zone transfer

Answer: D

Question No: 283 – (Topic 2)

Which of the following occurs when a packet is sent from a source computer to a destination computer?

  1. Broadcast transmission

  2. Unicast transmission

  3. Multicast transmission

  4. Baseband transmission

Answer: B

Question No: 284 – (Topic 2)

You work as a Network Administrator for McRoberts Inc. The company has a TCP-based network, which is connected to the Internet. Users use their Web browsers to connect to Web servers and to view different Web pages. Which of the following protocols ensures a secure connection between a Web browser and a Web server?

  1. L2TP

  2. SSL

  3. IPSec

  4. PPTP

Answer: B

Question No: 285 – (Topic 2)

On which of the following does a CGI program execute?

  1. Router

  2. Client and Web server

  3. Client

  4. Web server

Answer: D

Question No: 286 – (Topic 2)

Which of the following is a process of monitoring data packets that travel across a network?

  1. Packet sniffing

  2. Packet filtering

  3. Shielding

  4. Password guessing

Answer: A

Question No: 287 – (Topic 2)

Fill in the blanks with the appropriate values.

International Data Encryption Algorithm (IDEA) is a -bit block cipher that uses a

-bit key.

A. 64,128

Answer: A

Question No: 288 – (Topic 2)

Which of the following is used to allow or deny access to network resources?

  1. ACL

  2. System hardening

  3. Spoofing

  4. NFS

Answer: A

Question No: 289 – (Topic 2)

Which of the following VPN protocols offer encryption?

Each correct answer represents a complete solution. Choose two.

  1. L2F

  2. PPTP

  3. L2TP

  4. IPSec

Answer: B,D

Question No: 290 – (Topic 2)

Which of the following is used by attackers to obtain an authenticated connection on a network?

  1. Denial-of-Service (DoS) attack

  2. Replay attack

  3. Man-in-the-middle attack

  4. Back door

Answer: B

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE