[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 331-340

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!

GIAC Information Security Professional

Question No: 331 – (Topic 3)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-inthe- middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the Weare- secure server?

  1. RSA

  2. Diffie-Hellman

  3. Twofish

  4. Blowfish

Answer: B

Question No: 332 – (Topic 3)

Which of the following devices reads the destination#39;s MAC address from each incoming data packet and forwards the data packet to its destination?

  1. Hub

  2. Router

  3. Brouter

  4. Switch

Answer: D

Question No: 333 – (Topic 3)

Which of the following are default ports for the FTP service?

Each correct answer represents a complete solution. Choose two.

A. 443

  1. 20

  2. 21

  3. 80

Answer: B,C

Question No: 334 – (Topic 3)

Which of the following statements is true about transient noise?

  1. It is a momentary low voltage condition.

  2. It is a short duration of power line disruption.

  3. It is a prolonged power supply that is below the normal voltage.

  4. It is an electrical current that does not fluctuate.

Answer: B

Question No: 335 – (Topic 3)

Fill in the blanks with the appropriate values.

Twofish symmetric algorithm operates on -bit blocks and can support a key length of up to bits.

A. 128,256

Answer: A

Question No: 336 – (Topic 3)

Which of the following encryption strengths is used to secure NTLM version 2 passwords?

  1. 128-bit

  2. 32-bit

  3. 64-bit

  4. 56-bit

Answer: A

Question No: 337 – (Topic 3)

You work as a Network Administrator for Infonet Inc. The company#39;s network is connected to the Internet. The network has a Web server that is accessible to Internet users. For security, you want to keep the Web server separate from other servers on the network.

Where will you place the Web server?

  1. In a virtual private network (VPN)

  2. With the authentication server

  3. In a demilitarized zone (DMZ)

  4. With the database server

Answer: C

Question No: 338 – (Topic 3)

Which of the following statements about IPSec are true?

Each correct answer represents a complete solution. Choose two.

  1. It uses Password Authentication Protocol (PAP) for user authentication.

  2. It uses Encapsulating Security Payload (ESP) for data confidentiality.

  3. It uses Internet Protocol (IP) for data integrity.

  4. It uses Authentication Header (AH) for data integrity.

Answer: B,D

Question No: 339 – (Topic 3)

Which of the following are the responsibilities of the custodian of data? Each correct answer represents a complete solution. Choose two.

  1. Security of data

  2. User authentication

  3. Maintaining integrity of data

  4. Backing up data

Answer: A,C

Question No: 340 – (Topic 3)

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP- based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

  1. RAID-5

  2. RAID-0

  3. RAID-4

  4. RAID-3

  5. RAID-1

Answer: B

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE