[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 311-320

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 311 – (Topic 3)

Which of the following terms is synonymous with the willful destruction of another person#39;s property?

  1. Hacking

  2. Vandalism

  3. Spoofing

  4. Phishing

Answer: B

Question No: 312 – (Topic 3)

Which of the following protocols is used for sending e-mail messages between e-mail servers?

  1. IGMP

  2. SNMP

  3. ICMP

  4. SMTP

Answer: D

Question No: 313 – (Topic 3)

Samantha works as an Ethical Hacker for we-are-secure Inc. She wants to test the security of the weare- secure server for DoS attacks. She sends large number of ICMP ECHO packets to the target computer. Which of the following DoS attacking techniques will she use to accomplish the task?

  1. Land attack

  2. Ping flood attack

  3. Smurf dos attack

  4. Teardrop attack

Answer: B

Question No: 314 – (Topic 3)

Which of the following allows an administrator to find weak passwords on the network?

  1. Rainbow table

  2. Back door

  3. Worm

  4. Access control list

Answer: A

Question No: 315 – (Topic 3)

Which of the following is the most common method used by attackers to identify wireless networks?

  1. Back door

  2. Packet filtering

  3. Packet sniffing

  4. War driving

Answer: D

Question No: 316 – (Topic 3)

Which of the following attributes are used by Lightweight Directory Access Protocol (LDAP)

to notify the names of active directory elements?

Each correct answer represents a complete solution. Choose three.

  1. DC

  2. OU

  3. FN

  4. CN

Answer: A,B,D

Question No: 317 – (Topic 3)

Which of the following tools can be used by a user to hide his identity? Each correct answer represents a complete solution. Choose all that apply.

  1. War dialer

  2. IPchains

  3. Anonymizer

  4. Proxy server

  5. Rootkit

Answer: B,C,D

Question No: 318 – (Topic 3)

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

  1. Corroborating

  2. Circumstantial

  3. Direct

  4. Incontrovertible

Answer: B

Question No: 319 – (Topic 3)

Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose three.

  1. It hides the internal IP addressing scheme.

  2. It protects network from the password guessing attacks.

  3. It is used to connect private networks to the public Internet.

  4. It shares public Internet addresses with a large number of internal network clients.

Answer: A,C,D

Question No: 320 – (Topic 3)

Which of the following handles a relatively wide range of frequencies, which may be divided into channels or frequency bins?

  1. Broadband transmission

  2. Multicast transmission

  3. Baseband transmission

  4. Unicast transmission

Answer: A

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE