[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 41-50

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 41 – (Topic 1)

Which of the following statements about a host-based intrusion prevention system (HIPS)

are true?

Each correct answer represents a complete solution. Choose two.

  1. It can detect events scattered over the network.

  2. It is a technique that allows multiple computers to share one or more IP addresses.

  3. It cannot detect events scattered over the network.

  4. It can handle encrypted and unencrypted traffic equally.

Answer: C,D

Question No: 42 – (Topic 1)

You work as a professional Ethical Hacker. You are assigned a project to test the security of www.we-are-secure.com. You are working on the Windows Server 2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?

Each correct answer represents a complete solution. Choose all that apply.

  1. Use on-screen keyboards and speech-to-text conversion software which can also be useful agains keyloggers, as there are no typing or mouse movements involved.

  2. Remove the SNMP agent or disable the SNMP service.

  3. Use commercially available anti-keyloggers such as PrivacyKeyboard.

  4. Monitor the programs running on the server to see whether any new process is running on the server or not.

Answer: A,C,D

Question No: 43 – (Topic 1)

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

  1. Collusion

  2. Eavesdropping

  3. Buffer overflow

  4. Phishing

Answer: A

Question No: 44 – (Topic 1)

Which of the following protocols work at the data-link layer?

Each correct answer represents a complete solution. Choose two.

  1. NFS

  2. SSL

  3. ARP

  4. PPP

Answer: C,D

Question No: 45 – (Topic 1)

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?

  1. Web caching

  2. Hacking

  3. Packet filtering

  4. Spoofing

Answer: C

Question No: 46 – (Topic 1)

Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.

  1. Blowfish

  2. DES

  3. Diffie-Hellman

  4. RC5

Answer: A,B,D

Question No: 47 – (Topic 1)

Fill in the blank with the appropriate term.

A is a digital representation of information that identifies authorized users on the Internet and intranets.

A. certificate

Answer: A

Question No: 48 – (Topic 1)

Which of the following defines the communication link between a Web server and Web applications?

  1. PGP

  2. CGI

  3. IETF

  4. Firewall

Answer: B

Question No: 49 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are- secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

  1. The mutation engine of the virus is generating a new encrypted code.

  2. John has changed the signature of the virus.

  3. The virus, used by John, is not in the database of the antivirus program installed on the server.

  4. John has created a new virus.

Answer: A,B,C,D

Question No: 50 – (Topic 1)

Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.

  1. TACACS

  2. RADIUS

  3. Media Access control

  4. Peer-to-Peer

Answer: A,B

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE