[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 361-370

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 361 – (Topic 3)

Which of the following is an asymmetric encryption algorithm?

  1. RC5

  2. Diffie-Hellman

  3. RC4

  4. Blowfish

Answer: B

Question No: 362 – (Topic 3)

Which of the following terms ensures that no intentional or unintentional unauthorized modification is made to data?

  1. Non-repudiation

  2. Confidentiality

  3. Authentication

  4. Integrity

Answer: D

Question No: 363 – (Topic 3)

Which of the following statements about the availability concept of Information security management is true?

  1. It ensures that modifications are not made to data by unauthorized personnel or processes.

  2. It determines actions and behaviors of a single individual within a system.

  3. It ensures reliable and timely access to resources.

  4. It ensures that unauthorized modifications are not made to data by authorized personnel or processes.

Answer: C

Question No: 364 – (Topic 3)

Which of the following statements about Encapsulating Security Payload (ESP) are true? Each correct answer represents a complete solution. Choose two.

  1. It can also be nested with the Layer Two Tunneling Protocol (L2TP).

  2. It is an IPSec protocol.

  3. It uses TCP port 22 as the default port and operates at the application layer.

  4. It is a text-based communication protocol.

Answer: A,B

Question No: 365 – (Topic 3)

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

  1. NT authentication should be required for all customers before they provide their credit card numbers.

  2. The NTFS file system should be implemented on a client computer.

  3. Strong encryption software should be used to store credit card information.

  4. Limited and authorized access should be allowed on the stored credit card information.

Answer: C,D

Question No: 366 – (Topic 3)

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He enters a single quote in the input field of the login page of the Weare- secure Web site and receives the following error message:

Microsoft OLE DB Provider for ODBC Drivers error #39;0x80040E14#39;

This error message shows that the We-are-secure Website is vulnerable to .

  1. A Denial-of-Service attack

  2. A SQL injection attack

  3. An XSS attack

  4. A buffer overflow

Answer: B

Question No: 367 – (Topic 3)

In which type of access control do user ID and password system come under?

  1. Power

  2. Physical

  3. Technical

  4. Administrative

Answer: C

Question No: 368 – (Topic 3)

Which of the following provides protection against network eavesdropping and signal interference and works at the physical layer?

  1. IPSec protocol

  2. Router

  3. Switch

  4. Shielded twisted pair (STP)

Answer: D

Question No: 369 – (Topic 3)

Which of the following types of attacks occurs when attackers enter a system or capture network traffic and make changes to selected files or data packets?

  1. Brute force attack

  2. Teardrop attack

  3. Dictionary attack

  4. Data diddling attack

Answer: D

Question No: 370 – (Topic 3)

Which of the following statements about buffer overflow is true?

  1. It is a condition in which an application receives more data than it is configured to accept.

  2. It is a collection of files used by Microsoft for software updates released between major service pack releases.

  3. It is a false warning about a virus.

  4. It manages security credentials and public keys for message encryption.

Answer: A

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE