[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 351-360

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 351 – (Topic 3)

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as .

  1. File virus

  2. Polymorphic virus

  3. Stealth virus

  4. Multipartite virus

  5. Boot sector virus

Answer: A

Question No: 352 – (Topic 3)

Which of the following ports is assigned by Internet Assigned Number Authority (IANA) for

RADIUS authentication?

  1. TCP/UDP port 751

  2. TCP port 443

  3. TCP/UDP port 1812

  4. TCP/UDP port 5060

Answer: C

Question No: 353 – (Topic 3)

Which of the following is used in asymmetric encryption?

  1. Public key and user key

  2. Public key and private key

  3. SSL

  4. NTFS

Answer: B

Question No: 354 – (Topic 3)

Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?

  1. HTTPS

  2. PPTP

  3. L2TP

  4. SMTP

Answer: C

Question No: 355 – (Topic 3)

Which of the following should be implemented to protect an organization from spam?

  1. Packet filtering

  2. Auditing

  3. System hardening

  4. E-mail filtering

Answer: D

Question No: 356 – (Topic 3)

Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true?

Each correct answer represents a complete solution. Choose two.

  1. The server can optionally authenticate the client.

  2. The client always authenticates the server.

  3. The server always authenticates the client.

  4. The client can optionally authenticate the server.

Answer: A,B

Question No: 357 – (Topic 3)

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

  1. Wiretapping

  2. Spoofing

  3. Data diddling

  4. Eavesdropping

Answer: C

Question No: 358 – (Topic 3)

Which of the following is the default port for DNS zone transfer?

  1. Port 21

  2. Port 80

  3. Port 23

  4. Port 53

Answer: D

Question No: 359 – (Topic 3)

Which of the following entities are directly involved in Secure Electronic Transaction (SET)? Each correct answer represents a complete solution. Choose three.

  1. Merchant

  2. Credit card issuer

  3. Payment gateway

  4. Credit card holder

Answer: A,C,D

Question No: 360 – (Topic 3)

Which of the following types of safes can be chosen by an organization to store data backups or other types of valuables?

Each correct answer represents a complete solution. Choose three.

  1. Depositaries

  2. Chests

  3. Bottle safe

  4. Wall safe

Answer: A,B,D

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE