[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 51-60

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 51 – (Topic 1)

Which of the following statements about active attack is true?

  1. It does not insert false packets into the data stream.

  2. It makes the computer#39;s network services unavailable.

  3. It inserts false packets into the data stream.

  4. It locks out the users#39; accounts.

Answer: C

Question No: 52 – (Topic 1)

Which of the following are the ways of sending secure e-mail messages over the Internet? Each correct answer represents a complete solution. Choose two.

  1. PGP

  2. IPSec

  3. TLS

  4. S/MIME

Answer: A,D

Question No: 53 – (Topic 1)

Which of the following terms is used for a router that filters traffic before it is passed to the firewall?

  1. Honey pot

  2. Bastion host

  3. Demilitarized zone (DMZ)

  4. Screened host

Answer: D

Question No: 54 – (Topic 1)

Which of the following protocols is built in the Web server and browser to encrypt data

traveling over the Internet?

  1. UDP

  2. HTTP

  3. SSL

  4. IPSec

Answer: C

Question No: 55 – (Topic 1)

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

  1. Cookie

  2. Trade secret

  3. Utility model

  4. Copyright

Answer: B

Question No: 56 – (Topic 1)

Which of the following statements about Diffie-Hellman encryption are true? Each correct answer represents a complete solution. Choose two.

  1. It uses only a private key.

  2. It uses both a public key and a private key.

  3. It does not authenticate the parties involved.

  4. It was developed in 1976.

Answer: B,D

Question No: 57 – (Topic 1)

Andrew works as a Network Administrator for Infonet Inc. The company#39;s network has a Web server that hosts the company#39;s Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

  1. Secret

  2. Asymmetric

  3. Synchronous

  4. Symmetric

Answer: B,D

Question No: 58 – (Topic 1)

Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. Choose three.

  1. Acquire

  2. Analyze

  3. Encrypt

  4. Authenticate

Answer: A,B,D

Question No: 59 – (Topic 1)

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values: ItemID1=2 ItemPrice1=900 ItemID2=1 ItemPrice2=200

Modified cookie values: ItemID1=2 ItemPrice1=1 ItemID2=1 ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

  1. Cross site scripting

  2. Man-in-the-middle attack

  3. Cookie poisoning

  4. Computer-based social engineering

Answer: C

Question No: 60 – (Topic 1)

Which of the following is the default port for the NetBIOS name service?

  1. UDP port 137

  2. TCP port 110

  3. UDP port 138

  4. TCP port 119

Answer: A

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE