Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > GIAC > GIAC Certification > GISP

GISP GIAC Information Security Professional Question and Answers

Question # 4

Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?

A.

LMHOSTS

B.

Bastion host

C.

Firewall

D.

Gateway

Full Access
Question # 5

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

A.

Employees

B.

Hackers

C.

Visitors

D.

Customers

Full Access
Question # 6

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

A.

Building Risk free systems

B.

Assuring the integrity of organizational data

C.

Risk control

D.

Risk identification

Full Access
Question # 7

In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

A.

ARP spoofing

B.

Replay

C.

Brute force

D.

MAC duplicating

Full Access
Question # 8

Which of the following statements about the authentication concept of information security management is true?

A.

It ensures the reliable and timely access to resources.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.

D.

It establishes the users' identity and ensures that the users are who they say they are.

Full Access
Question # 9

Which of the following statement about snooping is true?

A.

It occurs when an unauthorized user tries to log on repeatedly to a computer or network by guessing usernames and passwords.

B.

It is an activity of observing the content that appears on a computer monitor or watching what a user is typing.

C.

It is a technique that makes a transmission appear to have come from an authentic source by forging the IP address.

D.

It is the art of convincing people and making them disclose useful information such as account names and passwords.

Full Access
Question # 10

Which of the following should be implemented to protect an organization from spam?

A.

Packet filtering

B.

Auditing

C.

System hardening

D.

E-mail filtering

Full Access
Question # 11

Which of the following terms ensures that no intentional or unintentional unauthorized modification is made to data?

A.

Non-repudiation

B.

Confidentiality

C.

Authentication

D.

Integrity

Full Access
Question # 12

Which of the following are the examples of technical controls?

Each correct answer represents a complete solution. Choose three.

A.

Auditing

B.

System access

C.

Data backups

D.

Network acchitecture

Full Access
Question # 13

Which of the following is used by attackers to record everything a person types, including usernames, passwords, and account information?

A.

Packet sniffing

B.

Spoofing

C.

Wiretapping

D.

Keystroke logging

Full Access
Question # 14

Which of the following are threats to network security?

Each correct answer represents a complete solution. Choose two.

A.

Dial-up connections

B.

Rogue employees

C.

Disabled user accounts

D.

Events auditing

Full Access
Question # 15

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

The NTFS file system should be implemented on a client computer.

C.

Strong encryption software should be used to store credit card information.

D.

Limited and authorized access should be allowed on the stored credit card information.

Full Access
Question # 16

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

A.

Bridge

B.

Antivirus software

C.

Gateway

D.

Firewall

Full Access
Question # 17

Which of the following protocols work at the network layer?

Each correct answer represents a complete solution. Choose three.

A.

RIP

B.

OSPF

C.

SPX

D.

IGMP

Full Access
Question # 18

What does TACACS stand for?

A.

Terminal Authorized Control Access Cyber System

B.

Terminal Adapter Controlling Access Control System

C.

Terminal Access Controller Access Control System

D.

Transfer Access Controller Auto Control System

Full Access
Question # 19

Which of the following is used by the Diffie-Hellman encryption algorithm?

A.

Password

B.

Access control entry

C.

Key exchange

D.

Access control list

Full Access
Question # 20

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

A.

Spoofing

B.

System hardening

C.

Shielding

D.

Auditing

Full Access
Question # 21

Which of the following statements about DES (Data Encryption Standard) is true?

A.

Its most widely used symmetric encryption algorithm uses a 56-bit key.

B.

Its most widely used symmetric encryption algorithm uses a 32-bit key.

C.

Its most widely used symmetric encryption algorithm uses a 128-bit key.

D.

Its most widely used symmetric encryption algorithm uses a 64-bit key.

Full Access
Question # 22

The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from children under __ years of age without verifiable permission of a parent?

A.

15

B.

13

C.

10

D.

21

E.

18

Full Access
Question # 23

Which of the following ports is used by a BOOTP server?

A.

UDP port 389

B.

UDP port 67

C.

TCP port 80

D.

TCP port 110

Full Access
Question # 24

Which of the following rate systems of Orange book has mandatory protection of the Trusted Computing Base (TCB)?

A.

B-rated system

B.

A-rated system

C.

D-rated system

D.

C-Rated system

Full Access
Question # 25

Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?

A.

National Institute of Standards and Technology (NIST)

B.

Request for Comments (RFC)

C.

Central Security Service (CSS)

D.

National Security Agency (NSA)

E.

American Bankers Association

F.

International Telecommunications Union

Full Access
Question # 26

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.

A.

transport

Full Access
Question # 27

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

A.

PGP

B.

TLS

C.

IPSec

D.

S/MIME

Full Access
Question # 28

Which of the following devices reads the destination's MAC address from each incoming data packet and forwards the data packet to its destination?

A.

Brouter

B.

Router

C.

Hub

D.

Switch

Full Access
Question # 29

Which of the following tools can be used by a user to hide his identity?

Each correct answer represents a complete solution. Choose all that apply.

A.

War dialer

B.

IPchains

C.

Anonymizer

D.

Proxy server

E.

Rootkit

Full Access
Question # 30

The _______ protocol allows applications to communicate across a network in a way designed to prevent eavesdropping and message forgery.

A.

PPP

B.

TCP

C.

EAP

D.

TLS

Full Access
Question # 31

Which of the following is a program that monitors data packets traveling across a network?

A.

Sniffer

B.

Smurf

C.

Hacker

D.

BitLocker

Full Access
Question # 32

Which of the following is an industry standard authentication protocol commonly used in UNIX networks?

A.

TACACS

B.

IPX

C.

SMTP

D.

MS-CHAP

Full Access
Question # 33

Which of the following is a technique used to attack an Ethernet wired or wireless network?

A.

DNS poisoning

B.

Keystroke logging

C.

Mail bombing

D.

ARP poisoning

Full Access
Question # 34

Which of the following is not a level of military data-classification system?

A.

Unclassified

B.

Normal

C.

Confidential

D.

Top secret

Full Access
Question # 35

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser 's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?

A.

The site's Web server has heavy traffic.

B.

WINS server has no NetBIOS name entry for the server.

C.

DNS entry is not available for the host name.

D.

The site's Web server is offline.

Full Access
Question # 36

An attacker sends a large number of packets to a target computer that causes denial of service. Which of the following type of attacks is this?

A.

Flooding

B.

Snooping

C.

Phishing

D.

Spoofing

Full Access
Question # 37

Which of the following hashing algorithms produces a variable length hash value?

A.

MD5

B.

SHA

C.

HAVAL

D.

MD4

Full Access
Question # 38

Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?

A.

DNS server

B.

Firewall

C.

Proxy server

D.

WINS server

Full Access
Question # 39

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

A.

IPSec

B.

S/MIME

C.

PGP

D.

TLS

Full Access
Question # 40

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

A.

RAID-5

B.

RAID-0

C.

RAID-4

D.

RAID-3

E.

RAID-1

Full Access
Question # 41

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

A.

WEP uses the RC4 encryption algorithm.

B.

The Initialization Vector (IV) field of WEP is only 24 bits long.

C.

Automated tools such as AirSnort are available for discovering WEP keys.

D.

It provides better security than the Wi-Fi Protected Access protocol.

Full Access
Question # 42

Which of the following is a link-state routing protocol?

A.

IGRP

B.

RIP v2

C.

RIP v1

D.

OSPF

Full Access
Question # 43

Which of the following types of attacks occurs when attackers enter a system or capture network traffic and make changes to selected files or data packets?

A.

Brute force attack

B.

Teardrop attack

C.

Dictionary attack

D.

Data diddling attack

Full Access
Question # 44

Which of the following tools can be used to perform tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing?

A.

Obiwan

B.

Cain

C.

L0phtcrack

D.

John the Ripper

Full Access
Question # 45

Which of the following refers to a program that allows access to a system by skipping the security checks?

A.

Honey pot

B.

Hoax

C.

Back door

D.

Worm

Full Access
Question # 46

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

A.

A DNS Zone

B.

An Intranet

C.

A demilitarized zone (DMZ)

D.

A stub zone

Full Access
Question # 47

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

A.

FTP server

B.

VPN

C.

Certificate server

D.

Microsoft Internet Information Server (IIS)

Full Access
Question # 48

Which of the following provides the best protection against a man-in-the-middle attack?

A.

Strong encryption

B.

Fiber-optic cable

C.

Strong password

D.

Firewall

Full Access
Question # 49

Which of the following statements about digital signature are true?

Each correct answer represents a complete solution. Choose two.

A.

It identifies a user who sends a message.

B.

It is created by implementing a public-key encryption.

C.

It is created by implementing a private-key encryption.

D.

It identifies a user who deletes a message.

Full Access
Question # 50

Which of the following layers of the OSI model provides non-repudiation services?

A.

The application layer

B.

The data-link layer

C.

The presentation layer

D.

The physical layer

Full Access
Question # 51

Fill in the blank with the appropriate value.

Primary Rate Interface (PRI) of an ISDN connection contains _______ B channels and ______ D channel.

A.

23,1

Full Access
Question # 52

Which of the following authentication methods support mutual authentication?

Each correct answer represents a complete solution. Choose two.

A.

MS-CHAP v2

B.

EAP-TLS

C.

EAP-MD5

D.

NTLM

Full Access
Question # 53

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

A.

The mutation engine of the virus is generating a new encrypted code.

B.

John has changed the signature of the virus.

C.

The virus, used by John, is not in the database of the antivirus program installed on the server.

D.

John has created a new virus.

Full Access
Question # 54

Which of the following processes is known as sanitization?

A.

Physically destroying the media and the information stored on it.

B.

Assessing the risk involved in discarding particular information.

C.

Verifying the identity of a person, network host, or system process.

D.

Removing the content from the media so that it is difficult to restore.

Full Access
Question # 55

Which of the following types of attacks slows down or stops a server by overloading it with requests?

A.

Vulnerability attack

B.

Impersonation attack

C.

Network attack

D.

DoS attack

Full Access
Question # 56

Which of the following components come under the network layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

A.

Firewalls

B.

Hub

C.

Routers

D.

MAC addresses

Full Access
Question # 57

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

A.

SYN attack

B.

Spoofing

C.

PING attack

D.

Brute force attack

Full Access
Question # 58

At which of the following layers Structured Query Language (SQL) works?

A.

Physical

B.

Network

C.

Transport

D.

Session

Full Access
Question # 59

Which of the following policies is set by a network administrator to allow users to keep their emails and documents for a fixed period of time?

A.

Retention policy

B.

Password policy

C.

Audit policy

D.

Backup policy

Full Access
Question # 60

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He writes the following snort rule:

This rule can help him protect the We-are-secure server from the __________.

A.

Chernobyl virus

B.

I LOVE YOU virus

C.

Melissa virus

D.

Nimda virus

Full Access
Question # 61

Which of the following statements about Network Address Translation (NAT) are true?

Each correct answer represents a complete solution. Choose two.

A.

It allows the computers in a private network to share a global, ISP assigned address to connect to the Internet.

B.

It reduces the need for globally unique IP addresses.

C.

It allows external network clients access to internal services.

D.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

Full Access
Question # 62

Which of the following statements about the bridge are true?

Each correct answer represents a complete solution. Choose two.

A.

It filters traffic based on IP addresses.

B.

It forwards broadcast packets.

C.

It assigns a different network address per port.

D.

It filters traffic based on MAC addresses.

Full Access
Question # 63

Which of the following practices come in the category of denial of service attack?

Each correct answer represents a complete solution. Choose three.

A.

Sending lots of ICMP packets to an IP address

B.

Disrupting services to a specific computer

C.

Performing Back door attack on a system

D.

Sending thousands of malformed packets to a network for bandwidth consumption

Full Access
Question # 64

Which of the following is the default port for the NetBIOS name service?

A.

UDP port 137

B.

TCP port 110

C.

UDP port 138

D.

TCP port 119

Full Access
Question # 65

You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this?

Each correct answer represents a complete solution. Choose two.

A.

Rename the Administrator account.

B.

Remove the Administrator account.

C.

Disable the Guest account.

D.

Enable the Guest account.

Full Access
Question # 66

Which of the following protocols is used to query and modify information stored within the directory services?

A.

PPTP

B.

ARP

C.

PAP

D.

LDAP

Full Access
Question # 67

Which of the following is a process of monitoring data packets that travel across a network?

A.

Packet sniffing

B.

Authentication

C.

Network binding

D.

Encryption

Full Access
Question # 68

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

A.

Secret

B.

Asymmetric

C.

Synchronous

D.

Symmetric

Full Access
Question # 69

Which of the following defines the communication link between a Web server and Web applications?

A.

PGP

B.

CGI

C.

IETF

D.

Firewall

Full Access
Question # 70

Fill in the blank with the appropriate term.

A ___________ is a digital representation of information that identifies authorized users on the Internet and intranets.

A.

certificate

Full Access
Question # 71

Brutus is a password cracking tool that can be used to crack the following authentications:

•HTTP (Basic Authentication)

•HTTP (HTML Form/CGI)

•POP3 (Post Office Protocol v3)

•FTP (File Transfer Protocol)

•SMB (Server Message Block)

•Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Brute force attack

C.

Replay attack

D.

Hybrid attack

E.

Man-in-the-middle attack

Full Access
Question # 72

Which of the following protocols work at the session layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

A.

File Transfer Protocol (FTP)

B.

Remote Procedure Call (RPC)

C.

Network File System (NFS)

D.

Transmission Control Protocol (TCP)

Full Access
Question # 73

Which of the following is not a major concern in traditional business transactions as compare to online transactions?

A.

Bookkeeping

B.

Security

C.

Product Quality

D.

Customer Support

Full Access
Question # 74

Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

A.

Snooping

B.

Phishing

C.

SYN attack

D.

Spoofing

Full Access
Question # 75

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

A.

Fraggle

B.

Ping of death

C.

Jolt

D.

Teardrop

Full Access
Question # 76

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

A.

RAID-1

B.

RAID-4

C.

RAID-3

D.

RAID-0

E.

RAID-5

Full Access
Question # 77

Which of the following statements about Secure Sockets Layer (SSL) are true?

Each correct answer represents a complete solution. Choose two.

A.

It provides communication privacy, authentication, and message integrity.

B.

It provides mail transfer service.

C.

It provides connectivity between Web browser and Web server.

D.

It uses a combination of public key and symmetric encryption for security of data.

Full Access
Question # 78

Routers and firewalls use _______ to determine which packets should be forwarded or dropped.

A.

Encryption

B.

Security audit log

C.

Access control list

D.

Ciphering

Full Access
Question # 79

In which of the following processes, a DNS server may return an incorrect IP address, diverting traffic to another computer?

A.

TCP FIN scanning

B.

DNS poisoning

C.

Snooping

D.

TCP SYN scanning

Full Access
Question # 80

Which of the following is a reason to implement security logging on a DNS server?

A.

For monitoring unauthorized zone transfer

B.

For preventing malware attacks on a DNS server

C.

For recording the number of queries resolved

D.

For measuring a DNS server's performance

Full Access
Question # 81

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _____ layer of the OSI model.

A.

transport

Full Access
Question # 82

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

•Network diagrams of the we-are-secure infrastructure

•Source code of the security tools

•IP addressing information of the we-are-secure network

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

A.

Graybox

B.

Whitebox

C.

Blackbox

D.

Alpha testing

Full Access
Question # 83

Which of the following provides the best protection against a man-in-the-middle attack?

A.

Fiber-optic cable

B.

Strong password

C.

Strong encryption

D.

Firewall

Full Access
Question # 84

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.

Which of the following DoS attacks is Maria using to accomplish her task?

A.

Ping flood attack

B.

Smurf DoS attack

C.

Fraggle DoS attack

D.

Teardrop attack

Full Access
Question # 85

Which of the following is a duplicate of the original site of an organization, with fully working systems as well as near-complete backups of user data?

A.

Hot site

B.

Cold site

C.

Data site

D.

Warm site

Full Access
Question # 86

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

A.

Rootkit

B.

Backdoor

C.

Access control list

D.

Rainbow table

Full Access
Question # 87

Which of the following attacks is specially used for cracking a password?

A.

DoS attack

B.

PING attack

C.

Dictionary attack

D.

Vulnerability attack

Full Access
Question # 88

Which of the following protocols work at the Application layer of an OSI model?

Each correct answer represents a complete solution. Choose three.

A.

Secure Hypertext Transfer Protocol (S-HTTP)

B.

Address Resolution Protocol (ARP)

C.

Post Office Protocol version 3 (POP3)

D.

Trivial File Transfer Protocol (TFTP)

Full Access
Question # 89

Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?

A.

EAP

B.

CHAP

C.

MS-CHAP v2

D.

PAP

Full Access
Question # 90

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the preattack phase successfully:

•Information gathering

•Determination of network range

•Identification of active systems

•Location of open ports and applications

Now, which of the following tasks should he perform next?

A.

Install a backdoor to log in remotely on the We-are-secure server.

B.

Map the network of We-are-secure Inc.

C.

Fingerprint the services running on the we-are-secure network.

D.

Perform OS fingerprinting on the We-are-secure network.

Full Access
Question # 91

Which of the following types of activities can be audited for security?

Each correct answer represents a complete solution. Choose three.

A.

Data downloading from the Internet

B.

File and object access

C.

Network logons and logoffs

D.

Printer access

Full Access
Question # 92

Which of the following services does Internet Information Server (IIS) provide along with HTTP?

Each correct answer represents a complete solution. Choose three.

A.

SMTP

B.

FTP

C.

PPTP

D.

NNTP

Full Access
Question # 93

In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

A.

Ciphertext only attack

B.

Chosen ciphertext attack

C.

Known plaintext attack

D.

Chosen plaintext attack

Full Access
Question # 94

Which of the following records is the first entry in a DNS database file?

A.

SRV

B.

CNAME

C.

MX

D.

SOA

Full Access
Question # 95

Which of the following are politically motivated threats that an organization faces?

Each correct answer represents a complete solution. Choose all that apply.

A.

Power distribution outages

B.

Civil disobedience

C.

Riot

D.

Terrorist attacks

E.

Vandalism

Full Access
Question # 96

Which of the following is generally practiced by the police or any other recognized governmental authority?

A.

SMB signing

B.

Phishing

C.

Spoofing

D.

Wiretapping

Full Access
Question # 97

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

A.

HTTP

B.

SSL

C.

SNMP

D.

TLS

Full Access
Question # 98

Which of the following are types of social engineering attacks?

Each correct answer represents a complete solution. Choose two.

A.

An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee.

B.

An unauthorized person inserts an intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts.

C.

An unauthorized person calls a user and pretends to be a system administrator in order to get the user's password.

D.

An unauthorized person modifies packet headers by using someone else's IP address to hide his identity.

Full Access