[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 321-330

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 321 – (Topic 3)

Which of the following records everything a person types using the keyboard?

  1. Line conditioner

  2. Firewall

  3. Port scanner

  4. Keystroke logger

Answer: D

Question No: 322 – (Topic 3)

Which of the following access control models uses a predefined set of access privileges for an object of a system?

  1. Policy Access Control

  2. Mandatory Access Control

  3. Role-Based Access Control

  4. Discretionary Access Control

Answer: B

Question No: 323 – (Topic 3)

Which of the following terms refers to a momentary low voltage?

  1. Blackout

  2. Spike

  3. Noise

  4. Sag

Answer: D

Question No: 324 – (Topic 3)

Which of the following is the best method to stop vulnerability attacks on a Web server?

  1. Implementing the latest virus scanner

  2. Using strong passwords

  3. Configuring a firewall

  4. Installing service packs and updates

Answer: D

Question No: 325 – (Topic 3)

Which of the following is the most secure method of authentication?

  1. Biometrics

  2. Smart card

  3. Anonymous

  4. Username and password

    Answer: A

    Question No: 326 – (Topic 3)

    This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

    鈥t displays the signal strength of a wireless network, MAC address, SISD, channel details, etc.

    鈥t is commonly used for the following purposes:

    1. War driving

    2. Detecting unauthorized access points

    3. Detecting causes of interference on a WLAN

    4. WEP ICV error tracking

    5. Making Graphs and Alarms on 802.11 Data, including Signal Strength This tool is known as .

      1. Kismet

      2. NetStumbler

      3. Absinthe

      4. THC-Scan

Answer: B

Question No: 327 – (Topic 3)

Which of the following are the phases of the Certification and Accreditation (Camp;A) process? Each correct answer represents a complete solution. Choose two.

  1. Auditing

  2. Initiation

  3. Detection

  4. Continuous Monitoring

Answer: B,D

Question No: 328 – (Topic 3)

Which of the following is the method of hiding data within another media type such as graphic or document?

  1. Spoofing

  2. Cryptanalysis

  3. Steganography

  4. Packet sniffing

Answer: C

Question No: 329 – (Topic 3)

Which of the following terms is described by the statement given below?

quot;It allows the server to authenticate itself to the client by using public-key techniques. It then allows the client and server to cooperate in creating symmetric keys that are used for encryption, decryption, and tamper detection during the SSL session that follows.quot;

  1. Secure Electronic Transaction (SET)

  2. Virtual Private Network (VPN)

  3. Secure Sockets Layer (SSL) Handshake

  4. Digital signature

Answer: C

Question No: 330 – (Topic 3)

Which of the following types of attacks occurs when an unauthorized person obtains passwords and other information from the packets that are traveling between two hosts by using an intermediary program?

  1. Denial-of-Service attack

  2. Man-in-the-middle attack

  3. Password guessing attack

  4. Dictionary attack

Answer: B

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE