[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 401-410

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 401 – (Topic 3)

Which of the following is a signature-based intrusion detection system (IDS) ?

  1. StealthWatch

  2. Snort

  3. RealSecure

  4. Tripwire

Answer: B

Question No: 402 – (Topic 3)

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

  1. Spoofing

  2. System hardening

  3. Shielding

  4. Auditing

Answer: C

Question No: 403 – (Topic 3)

An authentication method uses smart cards as well as usernames and passwords for

authentication. Which of the following authentication methods is being referred to?

  1. Biometrics

  2. Anonymous

  3. Mutual

  4. Multi-factor

Answer: D

Question No: 404 – (Topic 3)

Which of the following protocols is used to retrieve e-mails from a remote mail server?

  1. SNMP

  2. POP3

  3. SMTP

  4. IGMP

Answer: B

Question No: 405 – (Topic 3)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against

.

  1. SNMP enumeration

  2. DNS zone transfer

  3. IIS buffer overflow

  4. NetBIOS NULL session

Answer: C

Question No: 406 – (Topic 3)

Which of the following protocols allows Cisco devices to acquire and utilize digital certificates from Certification Authorities (CAs)?

  1. Extensible Authentication Protocol (EAP)

  2. Certificate Management Protocol (CMP)

  3. Hypertext Transfer Protocol (HTTP)

  4. Certificate Enrollment Protocol (CEP)

Answer: D

Question No: 407 – (Topic 3)

How many layers does the TCP/IP model consist of?

  1. Seven

  2. Four

  3. Six

  4. Five

Answer: B

Question No: 408 – (Topic 3)

Which of the following are threats to network security?

Each correct answer represents a complete solution. Choose two.

  1. Dial-up connections

  2. Rogue employees

  3. Disabled user accounts

  4. Events auditing

Answer: A,B

Question No: 409 – (Topic 3)

How long are cookies in effect if no expiration date is set?

  1. Forever

  2. Until the session ends.

  3. Fifteen days

  4. One year

Answer: B

Question No: 410 – (Topic 3)

You work as a Network Administrator for NetTech Inc. The company#39;s network has a Windows 2000 domain-based network. An employee of the company is dismissed for attempting to access secret data on the network. What measure will you take next to make the network secure?

  1. Change the password of the employee#39;s user account.

  2. Disable the employee#39;s user account.

  3. Remove the password of the employee#39;s user account.

  4. Disconnect the employee#39;s computer from the network.

Answer: B

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE