[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 291-300

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 291 – (Topic 2)

Which of the following are politically motivated threats that an organization faces? Each correct answer represents a complete solution. Choose all that apply.

  1. Power distribution outages

  2. Civil disobedience

  3. Riot

  4. Terrorist attacks

  5. Vandalism

Answer: B,C,D,E

Question No: 292 – (Topic 2)

Which of the following statements about Network Address Translation (NAT) is true?

  1. It hides the public network from internal hosts.

  2. It hides internal hosts from the public network.

  3. It uses public IP addresses on an internal network.

  4. It translates IP addresses into user friendly names.

Answer: B

Question No: 293 – (Topic 2)

Which of the following protocols provides maintenance and error reporting function?

  1. ICMP

  2. IGMP

  3. PPP

  4. UDP

Answer: A

Topic 3, Volume C

Question No: 294 – (Topic 3)

Which of the following statements is true about auditing?

  1. It is used to track user accounts for file and object access, logon attempts, etc.

  2. It is used to prevent unauthorized access to network resources.

  3. It is used to protect the network against virus attacks.

  4. It is used to secure the network or the computers on the network.

Answer: A

Question No: 295 – (Topic 3)

Which of the following statements about the integrity concept of information security management are true?

Each correct answer represents a complete solution. Choose three.

  1. It determines the actions and behaviors of a single individual within a system

  2. It ensures that unauthorized modifications are not made to data by authorized personnel or processes.

  3. It ensures that modifications are not made to data by unauthorized personnel or processes.

  4. It ensures that internal information is consistent among all subentities and also consistent with th real-world, external situation.

Answer: B,C,D

Question No: 296 – (Topic 3)

Which of the following OSI model layers handles translation of data into standard format, data compression, and decompression?

  1. Application

  2. Physical

  3. Presentation

  4. Session

Answer: C

Question No: 297 – (Topic 3)

Which of the following types of fire comes under Class K fire?

  1. Cooking oil fire

  2. Electrical fire

  3. Wooden fire

  4. Combustible metal fire

Answer: A

Question No: 298 – (Topic 3)

Which of the following file systems provides file-level security?

  1. CDFS

  2. FAT

  3. NTFS

  4. FAT32

Answer: C

Question No: 299 – (Topic 3)

Which of the following is an open source network intrusion detection system?

  1. Sourcefire

  2. NETSH

  3. Macof

  4. Snort

Answer: D

Question No: 300 – (Topic 3)

Which of the following are advantages of NTFS file system over FAT32 and FAT? Each correct answer represents a part of the solution. Choose two.

  1. Support for file and folder level permissions.

  2. Support for dual-booting.

  3. Support for Encrypting File System (EFS).

  4. Support for audio files.

Answer: A,C

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE