[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 341-350

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 341 – (Topic 3)

Which of the following uses a tunneling protocol?

  1. Firewall

  2. Internet

  3. LAN

  4. VPN

Answer: D

Question No: 342 – (Topic 3)

John works as a C programmer. He develops the following C program:

#include lt;stdlib.hgt;

#include lt;stdio.hgt;

#include lt;string.hgt; int buffer(char *str) { char buffer1[10]; strcpy(buffer1, str); return 1;

}

int main(int argc, char *argv[]) { buffer (argv[1]); printf(quot;Executed\nquot;);

return 1;

}

His program is vulnerable to a attack.

  1. Denial-of-Service

  2. SQL injection

  3. Buffer overflow

  4. Cross site scripting

Answer: C

Question No: 343 – (Topic 3)

Which of the following statements about System Access Control List (SACL) is true?

  1. It exists for each and every permission entry assigned to any object.

  2. It is a mechanism for reducing the need for globally unique IP addresses.

  3. It contains a list of both users and groups and whatever permissions they have.

  4. It contains a list of any events that are set to audit for that particular object.

Answer: D

Question No: 344 – (Topic 3)

Which of the following are the types of password guessing attacks? Each correct answer represents a complete solution. Choose two.

  1. Man-in-the-middle attack

  2. Dictionary attack

  3. Brute force attack

  4. Password attack

Answer: B,C

Question No: 345 – (Topic 3)

Which of the following need to be reduced to suppress a fire?

Each correct answer represents a complete solution. Choose all that apply.

  1. Oxygen

  2. Fuel

  3. CO2

  4. High temperature

Answer: A,B,D

Question No: 346 – (Topic 3)

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

  1. Authentication

  2. Non-repudiation

  3. Confidentiality

  4. Integrity

Answer: B

Question No: 347 – (Topic 3)

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.

  1. Blackbox testing

  2. Port redirection

  3. Firewalking

  4. Brainstorming

Answer: B

Question No: 348 – (Topic 3)

Which of the following provides the best protection against a man-in-the-middle attack?

  1. Strong encryption

  2. Fiber-optic cable

  3. Strong password

  4. Firewall

Answer: A

Question No: 349 – (Topic 3)

Which of the following layers of the OSI model provides non-repudiation services?

  1. The application layer

  2. The data-link layer

  3. The presentation layer

  4. The physical layer

Answer: A

Question No: 350 – (Topic 3)

Which of the following hardware devices prevents broadcasts from crossing over subnets?

  1. Bridge

  2. Router

  3. Modem

  4. Hub

Answer: B

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE