[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 301-310

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 301 – (Topic 3)

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

  1. Patent

  2. Snooping

  3. Copyright

  4. Utility model

Answer: A

Question No: 302 – (Topic 3)

Which of the following books deals with confidentiality?

  1. Brown Book

  2. Red Book

  3. Purple Book

  4. Orange Book

Answer: D

Question No: 303 – (Topic 3)

Which of the following can provide security against man-in-the-middle attack?

  1. Strong data encryption during travel

  2. Strong authentication method

  3. Firewall

  4. Anti-virus programs

Answer: A

Question No: 304 – (Topic 3)

Which of the following are the levels of military data classification system? Each correct answer represents a complete solution. Choose all that apply.

  1. Top Secret

  2. Sensitive

  3. Public

  4. Unclassified

  5. Secret

  6. Confidential

Answer: A,B,D,E,F

Question No: 305 – (Topic 3)

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark#39;s financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

  1. Privacy law

  2. Trademark law

  3. Security law

  4. Copyright law

Answer: A

Question No: 306 – (Topic 3)

Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

  1. IPSec

  2. NAT

  3. Firewall

  4. MAC address

Answer: A

Question No: 307 – (Topic 3)

Which of the following types of fiber optic cable is generally used in WANs and powered by laser light?

  1. Multi-mode fiber

  2. Single-mode fiber

  3. Dual-mode fiber

  4. Duplex-mode fiber

Answer: B

Question No: 308 – (Topic 3)

Which of the following protocols is used as the directory access protocol?

  1. HDAP

  2. NNTP

  3. FTP

  4. LDAP

Answer: D

Question No: 309 – (Topic 3)

Which of the following command-line utilities queries the DNS server to check whether or not the zone database contains the correct information?

  1. IPCONFIG

  2. TELNET

  3. NSLOOKUP

  4. NETSTAT

Answer: C

Question No: 310 – (Topic 3)

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true?

Each correct answer represents a complete solution. Choose two.

  1. It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.

  2. It uses TCP port 80 as the default port.

  3. It uses TCP port 443 as the default port.

  4. It is a protocol used to provide security for a database server in an internal network.

Answer: A,C

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE