[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 61-70

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 61 – (Topic 1)

Which of the following access control models are used in the commercial sector? Each correct answer represents a complete solution. Choose two.

  1. Clark-Wilson model

  2. Clark-Biba model

  3. Bell-LaPadula model

  4. Biba model

Answer: A,D

Question No: 62 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:

鈥athering information

鈥etermining the network range

鈥dentifying active systems

Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

  1. ARIN

  2. APNIC

  3. SuperScan

  4. RIPE

Answer: C

Question No: 63 – (Topic 1)

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser#39;s address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?

  1. The site#39;s Web server has heavy traffic.

  2. The site#39;s Web server is offline.

  3. WINS server has no NetBIOS name entry for the server.

  4. DNS entry is not available for the host name.

Answer: D

Question No: 64 – (Topic 1)

Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?

  1. Anti-x

  2. LIDS

  3. Scanlogd

  4. KFSensor

Answer: A

Question No: 65 – (Topic 1)

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

  1. SYN attack

  2. Spoofing

  3. PING attack

  4. Brute force attack

Answer: D

Question No: 66 – (Topic 1)

Which of the following are tunneling protocols?

Each correct answer represents a complete solution. Choose two.

  1. NNTP

  2. SMTP

  3. L2TP

  4. PPTP

Answer: C,D

Question No: 67 – (Topic 1)

Which of the following statements about the One Time Password (OTP) security system are true?

Each correct answer represents a complete solution. Choose two.

  1. It requires a password only once to authenticate users.

  2. It requires a new password every time a user authenticates himself.

  3. It generates passwords by using either the MD4 or MD5 hashing algorithm.

  4. It generates passwords by using Kerberos v5.

Answer: B,C

Question No: 68 – (Topic 1)

Which of the following are ensured by the concept of integrity in information system security?

Each correct answer represents a complete solution. Choose two.

  1. Unauthorized modifications are not made by authorized users.

  2. Data modifications are not made by an unauthorized user or process.

  3. The intentional or unintentional unauthorized disclosure of a message or important document contents is prevented.

  4. The systems are up and running when they are needed.

Answer: A,B

Question No: 69 – (Topic 1)

You work as a Network Administrator for Net World International. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. There are ten Sales Managers in the company. The company has recently provided laptops to all its Sales Managers. All the laptops run Windows XP Professional. These laptops will be connected to the company#39;s network

through wireless connections. The company#39;s management wants to implement Shared Key authentication for these laptops. When you try to configure the network interface card of one of the laptops for Shared Key authentication, you find no such option. What will you do to enable Shared Key authentication?

  1. Install PEAP-MS-CHAP v2.

  2. Install Service Pack 1.

  3. Enable WEP.

  4. Install EAP-TLS.

Answer: C

Question No: 70 – (Topic 1)

You work as a Network Administrator for Infonet Inc. The company#39;s network has an FTP server.

You want to secure the server so that only authorized users can access it. What will you do to accomplish this?

  1. Stop the FTP service on the server.

  2. Disable anonymous authentication.

  3. Disable the network adapter on the server.

  4. Enable anonymous authentication.

Answer: B

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE