[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 371-380

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 371 – (Topic 3)

Which of the following reads and writes data across network connections by using the TCP/IP protocol?

  1. Netcat

  2. NSLOOKUP

  3. 2Mosaic

  4. Fpipe

Answer: A

Question No: 372 – (Topic 3)

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

  1. A DNS Zone

  2. An Intranet

  3. A demilitarized zone (DMZ)

  4. A stub zone

Answer: C

Question No: 373 – (Topic 3)

At which of the following OSI model layers does the IPSec protocol work?

  1. Network layer

  2. Application layer

  3. Physical layer

  4. Data-link layer

Answer: A

Question No: 374 – (Topic 3)

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

  1. WEP uses the RC4 encryption algorithm.

  2. The Initialization Vector (IV) field of WEP is only 24 bits long.

  3. Automated tools such as AirSnort are available for discovering WEP keys.

  4. It provides better security than the Wi-Fi Protected Access protocol.

Answer: A,B,C

Question No: 375 – (Topic 3)

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

  1. Sensitive

  2. Private

  3. Public

  4. Unclassified

  5. Confidential

  6. Secret

Answer: A,B,C,E

Question No: 376 – (Topic 3)

On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?

  1. Session layer

  2. Transport layer

  3. Application layer

  4. Data-link layer

Answer: D

Question No: 377 – (Topic 3)

In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

  1. ARP spoofing

  2. Replay

  3. Brute force

  4. MAC duplicating

Answer: D

Question No: 378 – (Topic 3)

Which of the following books is used to examine integrity and availability?

  1. Brown Book

  2. Purple Book

  3. Orange Book

  4. Red Book

Answer: D

Question No: 379 – (Topic 3)

Which of the following statements about packet filtering is true?

  1. It is used to store information about confidential data.

  2. It is used to send confidential data on the public network.

  3. It allows or restricts the flow of encrypted packets to provide security.

  4. It allows or restricts the flow of specific types of packets to provide security.

Answer: D

Question No: 380 – (Topic 3)

Which of the following terms refers to a steady lower voltage state without a complete loss of power?

  1. Sag

  2. Brownout

  3. Blackout

  4. Spike

Answer: B

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE