[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 71-80

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISP.html

GIAC Information Security Professional

Question No: 71 – (Topic 1)

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the layer of the OSI model.

A. transport

Answer: A

Question No: 72 – (Topic 1)

Which of the following is a source port forwarder and redirector tool?

  1. Fpipe

  2. NMAP

  3. SuperScan

  4. NSLOOKUP

Answer: A

Question No: 73 – (Topic 1)

Which of the following statements about Due Care policy is true?

  1. It provides information about new viruses.

  2. It is a method used to authenticate users on a network.

  3. It identifies the level of confidentiality of information.

  4. It is a method for securing database servers.

Answer: C

Question No: 74 – (Topic 1)

Which of the following methods backs up all changes made since the last full or normal backup?

  1. Half backup

  2. Incremental backup

  3. Differential backup

  4. Full backup

Answer: C

Question No: 75 – (Topic 1)

Which of the following statements about Discretionary Access Control List (DACL) is true?

  1. It is a rule list containing access control entries.

  2. It specifies whether an audit activity should be performed when an object attempts to access a resource.

  3. It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.

  4. It is a unique number that identifies a user, group, and computer account.

Answer: C

Question No: 76 – (Topic 1)

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

  1. Social engineering attack

  2. Password guessing attack

  3. Mail bombing

  4. Cross site scripting attack

Answer: A

Question No: 77 – (Topic 1)

Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?

  1. Dictionary attack

  2. DDoS attack

  3. Insertion attack

  4. Evasion attack

Answer: B

Question No: 78 – (Topic 1)

Which of the following languages enable programmers to store cookies on client computers?

Each correct answer represents a complete solution. Choose two.

  1. Perl

  2. DHTML

  3. JavaScript

  4. HTML

Answer: A,C

Question No: 79 – (Topic 1)

Which of the following statement about eavesdropping is true?

  1. It is a type of password guessing attack.

  2. It is a way of preventing electronic emissions that are generated from a computer or network.

  3. It is known as network saturation attack or bandwidth consumption attack.

  4. It is the process of hearing or listening in private conversations.

Answer: D

Question No: 80 – (Topic 1)

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

  1. RAID-1

  2. RAID-10

  3. RAID-0

  4. RAID-5

Answer: A

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE