[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISP Dumps with VCE and PDF 91-100

CollectDumps 2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!

GIAC Information Security Professional

Question No: 91 – (Topic 1)

Which of the following statements about digital signature is true?

  1. Digital signature compresses the message to which it is applied.

  2. Digital signature is required for an e-mail message to get through a firewall.

  3. Digital signature verifies the identity of the person who applies it to a document.

  4. Digital signature decrypts the contents of documents.

Answer: C

Question No: 92 – (Topic 1)

Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?

  1. IMAP

  2. SNMP

  3. SMTP

  4. POP3

Answer: A

Question No: 93 – (Topic 1)

Which of the following refers to going through someone#39;s trash to find out useful or confidential information?

  1. Dumpster diving

  2. Hacking

  3. Phishing

  4. Spoofing

Answer: A

Question No: 94 – (Topic 1)

Which of the following have been developed to address security issues in the e-commerce system?

Each correct answer represents a complete solution. Choose two.

  1. Digital cash

  2. Encryption frameworks

  3. Shopping cart

  4. Digital signatures

Answer: B,D

Question No: 95 – (Topic 1)

Which of the following terms refers to the act of obtaining plain text from cipher text without a cryptographic key?

  1. Hacking

  2. Algorithm

  3. Cryptanalysis

  4. Ciphertext

Answer: C

Question No: 96 – (Topic 1)

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

  1. DoS attack

  2. Password sniffing

  3. Broadcast storm

  4. IP spoofing

Answer: B,D

Question No: 97 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He recommends a disk encryption tool to encrypt the secret files of the We-are-secure server. He presents a report to the We-are-secure authorities as given below:

Which of the following tools is John recommending for disk encryption on the We-are- secure server?

  1. CryptoHeaven

  2. Stunnel

  3. TrueCrypt

  4. Magic Lantern

Answer: C

Question No: 98 – (Topic 1)

Which of the following protocols is used to securely connect to a private network by a remote client using the Internet?

  1. PAP

  2. PPTP

  3. UDP

  4. IPSec

Answer: B

Question No: 99 – (Topic 1)

Which of the following categories of UTP cable has maximum data transfer rate of 155 Mbps?

  1. Category 5

  2. Category 3

  3. Category 7

  4. Category 6

Answer: D

Question No: 100 – (Topic 1)

Perfect World Inc., provides its sales managers access to the company#39;s network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company#39;s management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?

  1. Challenge Handshake Authentication Protocol (CHAP)

  2. Extensible Authentication Protocol (EAP)

  3. Open Shortest Path First (OSPF)

  4. Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

Answer: B

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE