[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 31-40

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 31 – (Topic 1)

Which of the following practices come in the category of denial of service attack? Each correct answer represents a complete solution. Choose three.

  1. Sending lots of ICMP packets to an IP address

  2. Disrupting services to a specific computer

  3. Performing Back door attack on a system

  4. Sending thousands of malformed packets to a network for bandwidth consumption

Answer: A,B,D

Question No: 32 – (Topic 1)

What does the Internet encryption and authentication system named RSA stand for?

  1. Rivest-Shamir-Adleman

  2. Read System Authority

  3. Rivest-System-Adleman

  4. Remote System Authority

Answer: A

Question No: 33 – (Topic 1)

Which of the following authentication methods support mutual authentication? Each correct answer represents a complete solution. Choose two.

  1. MS-CHAP v2

  2. EAP-TLS

  3. EAP-MD5

  4. NTLM

Answer: A,B

Question No: 34 – (Topic 1)

Fill in the blank with the appropriate layer name.

The Network layer of the OSI model corresponds to the layer of the TCP/IP model.

A. Internet

Answer: A

Question No: 35 – (Topic 1)

Which of the following are the application layer protocols for security? Each correct answer represents a complete solution. Choose three.

  1. Secure Hypertext Transfer Protocol (S-HTTP)

  2. Secure Sockets Layer (SSL)

  3. Secure Electronic Transaction (SET)

  4. Secure Shell (SSH)

Answer: A,C,D

Question No: 36 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

  1. Session splicing attack

  2. Evasion attack

  3. Insertion attack

  4. Polymorphic shell code attack

Answer: D

Question No: 37 – (Topic 1)

Which of the following types of attacks is only intended to make a computer resource unavailable to its users?

  1. Teardrop attack

  2. Denial of Service attack

  3. Land attack

  4. Replay attack

Answer: B

Question No: 38 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

  1. RPC

  2. IDLE

  3. UDP

  4. TCP SYN/ACK

Answer: D

Question No: 39 – (Topic 1)

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

  1. SPAP

  2. MSCHAP V2

  3. PAP

  4. MSCHAP

Answer: C

Question No: 40 – (Topic 1)

Which of the following are data link layer components?

Each correct answer represents a complete solution. Choose three.

  1. Switches

  2. Bridges

  3. MAC addresses

  4. Hub

Answer: A,B,C

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE