[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 411-420

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 411 – (Topic 3)

Which of the following is a documentation of guidelines that are used to create archival copies of important data?

  1. Backup policy

  2. Security policy

  3. User policy

  4. Audit policy

Answer: A

Question No: 412 – (Topic 3)

Which of the following encryption algorithms are based on symmetric key cryptographic algorithms?

Each correct answer represents a complete solution. Choose all that apply.

  1. RC5

  2. AES

  3. DSA

  4. Blowfish

  5. IDEA

Answer: A,B,D,E

Question No: 413 – (Topic 3)

Which of the following are the basic architectures of microprocessors used in modern computers?

Each correct answer represents a complete solution. Choose two.

  1. ASCII

  2. RISC

  3. CISC

  4. PCIe

Answer: B,C

Question No: 414 – (Topic 3)

Which of the following statements about the authentication concept of information security management is true?

  1. It ensures the reliable and timely access to resources.

  2. It ensures that modifications are not made to data by unauthorized personnel or processes.

  3. It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.

  4. It establishes the users#39; identity and ensures that the users are who they say they are.

Answer: D

Question No: 415 – (Topic 3)

Which of the following refers to a program that allows access to a system by skipping the security checks?

  1. Honey pot

  2. Hoax

  3. Back door

  4. Worm

Answer: C

Question No: 416 – (Topic 3)

You are going to upgrade your hard disk#39;s file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?

Each correct answer represents a complete solution. Choose all that apply.

  1. NTFS gives better file security than FAT16 and FAT32.

  2. NTFS file system supports for larger hard disks.

  3. NTFS give improved disk compression than FAT16 and FAT32.

  4. Automatic backup.

Answer: A,B,C

Question No: 417 – (Topic 3)

Which of the following is used by attackers to record everything a person types, including usernames, passwords, and account information?

  1. Packet sniffing

  2. Spoofing

  3. Wiretapping

  4. Keystroke logging

Answer: D

Question No: 418 – (Topic 3)

Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

  1. Port Address Translation (PAT)

  2. Dynamic NAT

  3. Static NAT

  4. Cache NAT

Answer: B

Question No: 419 – (Topic 3)

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company#39;s intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

  1. FTP server

  2. VPN

  3. Certificate server

  4. Microsoft Internet Information Server (IIS)

Answer: C

Question No: 420 – (Topic 3)

Which of the following terms describes an attempt to transfer DNS zone data?

  1. Reconnaissance

  2. Spam

  3. Dumpster diving

  4. Encapsulation

Answer: A

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE