[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 381-390

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 381 – (Topic 3)

Which of the following statements about a certificate is true?

  1. A certificate is a method of encryption used to send mails.

  2. A certificate is used to protect intranets against virus attacks.

  3. A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.

  4. A certificate is a digital representation of information that identifies unauthorized communication packets on the Internet and intranets.

Answer: C

Question No: 382 – (Topic 3)

Which of the following statements is true about a polymorphic virus?

  1. It is a type of virus that removes access permissions from files.

  2. This type of virus hides system files.

  3. It copies itself onto the boot sector of hard disk drives.

  4. It has the ability to change its own signature at the time of infection.

Answer: D

Question No: 383 – (Topic 3)

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook#39;s preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

  1. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

  2. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

  3. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

  4. HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = quot;file and pathname of the WAB filequot;

Answer: D

Question No: 384 – (Topic 3)

Which of the following statements about Discretionary Access Control List (DACL) is true?

  1. It contains a list of any events that are set to audit for that particular object.

  2. It is a mechanism for reducing the need for globally unique IP addresses.

  3. It contains a list of both users and groups and whatever permissions they have.

  4. It exists for each and every permission entry assigned to any object.

Answer: C

Question No: 385 – (Topic 3)

Which of the following statement about snooping is true?

  1. It occurs when an unauthorized user tries to log on repeatedly to a computer or network by guessing usernames and passwords.

  2. It is an activity of observing the content that appears on a computer monitor or watching what a user is typing.

  3. It is a technique that makes a transmission appear to have come from an authentic source by forging the IP address.

  4. It is the art of convincing people and making them disclose useful information such as account names and passwords.

Answer: B

Question No: 386 – (Topic 3)

Which of the following tools or services is used to find the entire IP address range used by an organization?

  1. TRACERT

  2. Ping Scanner

  3. PATHPING

  4. Share Scanner

Answer: B

Question No: 387 – (Topic 3)

Which of the following statements about digital signature are true? Each correct answer represents a complete solution. Choose two.

  1. It identifies a user who sends a message.

  2. It is created by implementing a public-key encryption.

  3. It is created by implementing a private-key encryption.

  4. It identifies a user who deletes a message.

Answer: A,B

Question No: 388 – (Topic 3)

You are installing Windows 2000 Server. You decide to use RAID-5 volume disk configuration for fault tolerance. What is the minimum number of disk drives required for implementing RAID-5 volumes?

  1. Thirty-two

  2. Two

  3. Three

  4. One

Answer: C

Question No: 389 – (Topic 3)

Which of the following OSI model layers handles addressing and routing?

  1. Session

  2. Physical

  3. Network

  4. Application

Answer: C

Question No: 390 – (Topic 3)

How many keys are used to encrypt data in symmetric encryption?

  1. Two

  2. Three

  3. Four

  4. One

Answer: D

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE