[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 441-450

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 441 – (Topic 3)

Which of the following ports is the default port for IMAP4 protocol?

  1. TCP port 25

  2. TCP port 143

  3. TCP port 80

  4. TCP port 443

Answer: B

Question No: 442 – (Topic 3)

Which of the following tools can be used to perform tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing?

  1. Obiwan

  2. Cain

  3. L0phtcrack

  4. John the Ripper

Answer: B

Topic 4, Volume D

Question No: 443 – (Topic 4)

Which of the following authentication methods is used to access public areas of a Web site?

  1. Anonymous authentication

  2. Multi-factor authentication

  3. Biometrics authentication

  4. Mutual authentication

Answer: A

Question No: 444 – (Topic 4)

Which of the following statements about symmetric encryption are true? Each correct answer represents a complete solution. Choose three.

  1. It is best suited for encrypting large amount of data.

  2. It is used by Data Encryption Standard (DES) to encrypt data.

  3. It uses two keys – a public key and a private key pair for data encryption.

  4. It is a relatively fast encryption method than public key encryption.

Answer: A,B,D

Question No: 445 – (Topic 4)

Which of the following ports is used by the control connection on the FTP server?

  1. TCP port 23

  2. TCP port 21

  3. TCP port 53

  4. TCP port 443

Answer: B

Question No: 446 – (Topic 4)

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

  1. Tunneling

  2. Spoofing

  3. Packet filtering

  4. Packet sniffing

Answer: A

Question No: 447 – (Topic 4)

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

  1. Eavesdropping

  2. Dumpster diving

  3. Placing a backdoor

  4. Shoulder surfing

Answer: A,B,D

Question No: 448 – (Topic 4)

Which of the following protocols transmits user credentials as plaintext?

  1. MS-CHAP

  2. PAP

  3. MS-CHAP v2

  4. CHAP

Answer: B

Question No: 449 – (Topic 4)

Which of the following tools was developed by the FBI and is used for keystroke logging in order to capture encryption keys and other information useful for deciphering transmissions?

  1. Alchemy Remote Executor

  2. Stealth Voice Recorder

  3. KeyGhost USB keylogger

  4. KeyGhost keylogger

  5. Magic Lantern

Answer: E

Question No: 450 – (Topic 4)

In which of the following processes, a DNS server may return an incorrect IP address, diverting traffic to another computer?

  1. TCP FIN scanning

  2. DNS poisoning

  3. Snooping

  4. TCP SYN scanning

Answer: B

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE