Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

GIAC GISP GIAC Information Security Professional Exam Practice Test

Page: 1 / 66
Total 659 questions

GIAC Information Security Professional Questions and Answers

Question 1

Which of the following is an asymmetric encryption algorithm?

Options:

A.

RC5

B.

Diffie-Hellman

C.

RC4

D.

Blowfish

Question 2

Which of the following safes are large enough to allow a person to enter?

Options:

A.

Wall safes

B.

Floor safes

C.

Vaults

D.

Chests

Question 3

Which of the following statements about buffer overflow is true?

Options:

A.

It is a condition in which an application receives more data than it is configured to accept.

B.

It is a collection of files used by Microsoft for software updates released between major service pack releases.

C.

It is a false warning about a virus.

D.

It manages security credentials and public keys for message encryption.

Question 4

Which of the following devices reads the destination's MAC address from each incoming data packet and forwards the data packet to its destination?

Options:

A.

Hub

B.

Router

C.

Brouter

D.

Switch

Question 5

Which of the following records everything a person types using the keyboard?

Options:

A.

Line conditioner

B.

Firewall

C.

Port scanner

D.

Keystroke logger

Question 6

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.

Options:

A.

File virus

B.

Polymorphic virus

C.

Stealth virus

D.

Multipartite virus

E.

Boot sector virus

Question 7

Samantha works as an Ethical Hacker for we-are-secure Inc. She wants to test the security of the weare- secure server for DoS attacks. She sends large number of ICMP ECHO packets to the target computer. Which of the following DoS attacking techniques will she use to accomplish the task?

Options:

A.

Land attack

B.

Ping flood attack

C.

Smurf dos attack

D.

Teardrop attack

Question 8

Which of the following terms refers to a momentary low voltage?

Options:

A.

Blackout

B.

Spike

C.

Noise

D.

Sag

Question 9

Which of the following are the causes of power noise?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Electromagnetic interference

B.

Shielded line

C.

Power regulator

D.

Radio frequency interference

Question 10

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Options:

A.

FTP server

B.

VPN

C.

Certificate server

D.

Microsoft Internet Information Server (IIS)

Question 11

Which of the following reads and writes data across network connections by using the TCP/IP protocol?

Options:

A.

Netcat

B.

NSLOOKUP

C.

2Mosaic

D.

Fpipe

Question 12

Which of the following statements is true about auditing?

Options:

A.

It is used to track user accounts for file and object access, logon attempts, etc.

B.

It is used to prevent unauthorized access to network resources.

C.

It is used to protect the network against virus attacks.

D.

It is used to secure the network or the computers on the network.

Question 13

Which of the following protocols is used for sending e-mail messages between e-mail servers?

Options:

A.

IGMP

B.

SNMP

C.

ICMP

D.

SMTP

Question 14

Which of the following is a signature-based intrusion detection system (IDS) ?

Options:

A.

StealthWatch

B.

Snort

C.

RealSecure

D.

Tripwire

Question 15

How many keys are used to encrypt data in symmetric encryption?

Options:

A.

Two

B.

Three

C.

Four

D.

One

Question 16

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Spoofing

B.

Cryptanalysis

C.

Steganography

D.

Packet sniffing

Question 17

Which of the following are the basic architectures of microprocessors used in modern computers?

Each correct answer represents a complete solution. Choose two.

Options:

A.

ASCII

B.

RISC

C.

CISC

D.

PCIe

Question 18

You are installing Windows 2000 Server. You decide to use RAID-5 volume disk configuration for fault tolerance. What is the minimum number of disk drives required for implementing RAID-5 volumes?

Options:

A.

Thirty-two

B.

Two

C.

Three

D.

One

Question 19

Which of the following protocols allows Cisco devices to acquire and utilize digital certificates from Certification Authorities (CAs)?

Options:

A.

Extensible Authentication Protocol (EAP)

B.

Certificate Management Protocol (CMP)

C.

Hypertext Transfer Protocol (HTTP)

D.

Certificate Enrollment Protocol (CEP)

Question 20

Which of the following OSI model layers handles translation of data into standard format, data compression, and decompression?

Options:

A.

Application

B.

Physical

C.

Presentation

D.

Session

Question 21

The 802.11b wireless standard has a data transfer speed of up to ________.

Options:

A.

11Mbps

B.

110Mbps

C.

54Mbps

D.

56Mbps

Question 22

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:

A.

B-rated

B.

A-rated

C.

D-rated

D.

C-rated

Question 23

Which of the following devices reads the destination's MAC address from each incoming data packet and forwards the data packet to its destination?

Options:

A.

Brouter

B.

Router

C.

Hub

D.

Switch

Question 24

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:

A.

TCP SYN/ACK

B.

IDLE

C.

UDP

D.

RPC

Question 25

What are packet sniffers?

Options:

A.

Packet sniffers test package security.

B.

Packet sniffers capture the packages as they cross the network.

C.

Packet sniffers encrypt the packages as they cross the network.

D.

Packet sniffers test the packages to verify data integrity.

Question 26

Which of the following protocols is used to establish a secure TELNET session over TCP/IP?

Options:

A.

PGP

B.

SSH

C.

SSL

D.

IPSEC

Question 27

Which of the following is a program that monitors data packets traveling across a network?

Options:

A.

Sniffer

B.

Smurf

C.

Hacker

D.

BitLocker

Question 28

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.

Options:

A.

Blackbox testing

B.

Port redirection

C.

Firewalking

D.

Brainstorming

Question 29

What does TACACS stand for?

Options:

A.

Terminal Authorized Control Access Cyber System

B.

Terminal Adapter Controlling Access Control System

C.

Terminal Access Controller Access Control System

D.

Transfer Access Controller Auto Control System

Question 30

Which of the following statements about DES (Data Encryption Standard) is true?

Options:

A.

Its most widely used symmetric encryption algorithm uses a 56-bit key.

B.

Its most widely used symmetric encryption algorithm uses a 32-bit key.

C.

Its most widely used symmetric encryption algorithm uses a 128-bit key.

D.

Its most widely used symmetric encryption algorithm uses a 64-bit key.

Question 31

Which of the following types of computers is used for attracting potential intruders?

Options:

A.

Honey pot

B.

Bastion host

C.

Data pot

D.

Files pot

Question 32

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Corroborating

B.

Circumstantial

C.

Direct

D.

Incontrovertible

Question 33

Which of the following are the phases of the Certification and Accreditation (C&A) process?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Auditing

B.

Initiation

C.

Detection

D.

Continuous Monitoring

Question 34

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:

A.

A-rated

B.

C-rated

C.

B-rated

D.

D-rated

Question 35

Identify whether the given statement is true or false.

"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

Options:

A.

False

B.

True

Question 36

Which of the following protocols provides maintenance and error reporting function?

Options:

A.

ICMP

B.

IGMP

C.

PPP

D.

UDP

Question 37

Which of the following should propose applicable and effective security controls for managing the risks?

Options:

A.

Risk assessment

B.

Risk treatment plan

C.

Risk communication

D.

Risk management plan

Question 38

Which of the following types of fire comes under Class K fire?

Options:

A.

Cooking oil fire

B.

Electrical fire

C.

Wooden fire

D.

Combustible metal fire

Question 39

How many voice channels are available in a T2 line?

Options:

A.

1

B.

10

C.

24

D.

34

Question 40

Which of the following encryption methods comes under symmetric encryption algorithm?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Blowfish

B.

DES

C.

Diffie-Hellman

D.

RC5

Question 41

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.

Network-based

B.

File-based

C.

Signature-based

D.

Anomaly-based

Question 42

Which of the following protocols transmits user credentials as plaintext?

Options:

A.

MS-CHAP

B.

PAP

C.

MS-CHAP v2

D.

CHAP

Question 43

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For monitoring unauthorized zone transfer

B.

For preventing malware attacks on a DNS server

C.

For recording the number of queries resolved

D.

For measuring a DNS server's performance

Question 44

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Shoulder surfing

B.

Dumpster diving

C.

Placing a backdoor

D.

Eavesdropping

Question 45

Which of the following uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients?

Options:

A.

SSL

B.

TLS

C.

PGP

D.

EAP

Question 46

Which of the following processes is known as Declassification?

Options:

A.

Removing the content from the media so that it is difficult to restore.

B.

Physically destroying the media and the information stored on it.

C.

Assessing the risk involved in making a confidential document available to public.

D.

Verifying the identity of a person, network host, or system process.

Question 47

Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

Options:

A.

Snooping

B.

Phishing

C.

SYN attack

D.

Spoofing

Question 48

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:

A.

Visitors

B.

Customers

C.

Employees

D.

Hackers

Question 49

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

PING

B.

IPCONFIG

C.

TRACERT

D.

NSLOOKUP

Question 50

Which of the following is NOT a countermeasure against a spoofing attack?

Options:

A.

Patching operating system

B.

Installing Anti-virus software

C.

Patching application

D.

Employing IDS

Question 51

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

Options:

A.

TCP port 110

B.

UDP port 161

C.

UDP port 1701

D.

TCP port 443

Question 52

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

•Network diagrams of the we-are-secure infrastructure

•Source code of the security tools

•IP addressing information of the we-are-secure network

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

Options:

A.

Graybox

B.

Whitebox

C.

Blackbox

D.

Alpha testing

Question 53

Which of the following is a duplicate of the original site of an organization, with fully working systems as well as near-complete backups of user data?

Options:

A.

Hot site

B.

Cold site

C.

Data site

D.

Warm site

Question 54

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Blowfish

B.

DES

C.

RC4

D.

IDEA

Question 55

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.

Which of the following DoS attacks is Maria using to accomplish her task?

Options:

A.

Ping flood attack

B.

Smurf DoS attack

C.

Fraggle DoS attack

D.

Teardrop attack

Question 56

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. While examining a log report, he finds that an intrusion has been attempted by an attacker whose IP address is 0x40.0x3A.0x2B.0xE6. Which of the following decimal IP addresses will respond to the ping on the above Hexadecimal IP address?

Options:

A.

64.58.42.230

B.

64.59.43.230

C.

64.58.43.231

D.

64.58.43.230

Question 57

Brutus is a password cracking tool that can be used to crack the following authentications:

•HTTP (Basic Authentication)

•HTTP (HTML Form/CGI)

•POP3 (Post Office Protocol v3)

•FTP (File Transfer Protocol)

•SMB (Server Message Block)

•Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dictionary attack

B.

Brute force attack

C.

Replay attack

D.

Hybrid attack

E.

Man-in-the-middle attack

Question 58

Which of the following defines the communication link between a Web server and Web applications?

Options:

A.

Firewall

B.

IETF

C.

CGI

D.

PGP

Question 59

Which of the following statements about smurf is true?

Options:

A.

It is a UDP attack that involves spoofing and flooding.

B.

It is an ICMP attack that involves spoofing and flooding.

C.

It is a denial of service (DoS) attack that leaves TCP ports open.

D.

It is an attack with IP fragments that cannot be reassembled.

Question 60

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

Configure the authentication type for the wireless LAN to Open system.

B.

Broadcast SSID to connect to the access point (AP).

C.

Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

D.

Install a firewall software on each wireless access point.

E.

On each client computer, add the SSID for the wireless LAN as the preferred network.

F.

Configure the authentication type for the wireless LAN to Shared Key.

Question 61

Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?

Options:

A.

Anti-x

B.

LIDS

C.

Scanlogd

D.

KFSensor

Question 62

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

NSLOOKUP

B.

IPCONFIG

C.

PING

D.

TRACERT

Question 63

Fill in the blank with the appropriate value.

Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.

Options:

A.

32

Question 64

Which of the following are the differences between PPTP and L2TP?

Each correct answer represents a complete solution. Choose three.

Options:

A.

L2TP does not provide any kind of security.

B.

PPTP connections use Microsoft Point-to-Point Encryption (MPPE), whereas L2TP uses Data Encryption Standard (DES).

C.

L2TP may be used with IPSec, while PPTP stands alone.

D.

PPTP is supported by most industry vendors, while L2TP is a proprietary Microsoft standard.

Question 65

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He recommends a disk encryption tool to encrypt the secret files of the We-are-secure server. He presents a report to the We-are-secure authorities as given below:

Which of the following tools is John recommending for disk encryption on the We-are-secure server?

Options:

A.

CryptoHeaven

B.

Stunnel

C.

TrueCrypt

D.

Magic Lantern

Question 66

You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Rename the Administrator account.

B.

Remove the Administrator account.

C.

Disable the Guest account.

D.

Enable the Guest account.

Question 67

Which of the following are the application layer protocols for security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Secure Hypertext Transfer Protocol (S-HTTP)

B.

Secure Sockets Layer (SSL)

C.

Secure Electronic Transaction (SET)

D.

Secure Shell (SSH)

Question 68

Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?

Options:

A.

Terminal service

B.

DFS service

C.

SMTP service

D.

Directory service

Question 69

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

Options:

A.

Cross site scripting

B.

Man-in-the-middle attack

C.

Cookie poisoning

D.

Computer-based social engineering

Question 70

Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?

Options:

A.

Proxy server

B.

Security

C.

Cookies

D.

Certificate

Question 71

Which of the following is the most secure authentication method?

Options:

A.

Certificate-based authentication

B.

Basic authentication

C.

Digest authentication

D.

Integrated Windows authentication

Question 72

Which of the following are the centralized administration technologies?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

TACACS+

B.

RADIUS

C.

Media Access control

D.

Peer-to-Peer

Question 73

Which methods help you to recover your data in the event of a system or hard disk failure?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Install a RAID system

B.

Use data encryption

C.

Install and use a tape backup unit

D.

Install UPS systems on all important devices

Question 74

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

False positive

B.

False negative

C.

True negative

D.

True positive

Question 75

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The mutation engine of the virus is generating a new encrypted code.

B.

John has changed the signature of the virus.

C.

The virus, used by John, is not in the database of the antivirus program installed on the server.

D.

John has created a new virus.

Question 76

Which of the following does Certification Authority (CA) provide in an e-commerce system?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Credit

B.

Trust

C.

Transparency

D.

Identification

Question 77

Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?

Options:

A.

Dictionary attack

B.

DDoS attack

C.

Insertion attack

D.

Evasion attack

Question 78

Which of the following layers of the OSI model provides end-to-end service?

Options:

A.

The physical layer

B.

The application layer

C.

The session layer

D.

The transport layer

Question 79

Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?

Options:

A.

IMAP

B.

SNMP

C.

SMTP

D.

POP3

Question 80

Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?

Options:

A.

Type II

B.

Type I

C.

Type III

D.

Type IV

Question 81

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Building Risk free systems

B.

Assuring the integrity of organizational data

C.

Risk control

D.

Risk identification

Question 82

Which of the following types of evidence is considered as the best evidence?

Options:

A.

A copy of the original document

B.

A computer-generated record

C.

Information gathered through the witness's senses

D.

The original document

Question 83

Which of the following refers to a condition in which a computer repeatedly sends ICMP echo requests to another host?

Options:

A.

Broadcast storm

B.

SYN attack

C.

Spoofing

D.

PING attack

Question 84

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?

Options:

A.

Microsoft Point-to-Point Encryption (MPPE)

B.

Pretty Good Privacy (PGP)

C.

Data Encryption Standard (DES)

D.

IP Security (IPSec)

Question 85

Which of the following services is provided by the message authentication code (MAC) ?

Options:

A.

Data recovery

B.

Integrity

C.

Fault tolerance

D.

Key recovery

Question 86

A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to perform war dialing?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

ToneLoc

B.

THC-Scan

C.

Wingate

D.

NetStumbler

Question 87

Which of the following statements about buffer overflow are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a situation that occurs when a storage device runs out of space.

B.

It can terminate an application.

C.

It can improve application performance.

D.

It is a situation that occurs when an application receives more data than it is configured to accept

Question 88

Which of the following protocols work at the network layer?

Each correct answer represents a complete solution. Choose three.

Options:

A.

OSPF

B.

SPX

C.

IGMP

D.

RIP

Question 89

Which of the following protocols uses TCP port 22 as the default port and operates at the application layer?

Options:

A.

Secure Sockets Layer (SSL)

B.

Secure Shell (SSH)

C.

Post Office Protocol version 3 (POP3)

D.

Trivial File Transfer Protocol (TFTP)

Question 90

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?

Options:

A.

HTTPS

B.

HTTP

C.

TELNET

D.

NetBIOS

Question 91

Which of the following statements about system hardening are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is used for securing the computer hardware.

B.

It can be achieved by locking the computer room.

C.

It is used for securing an operating system.

D.

It can be achieved by installing service packs and security updates on a regular basis.

Question 92

Which of the following are man-made threats that an organization faces?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Frauds

B.

Strikes

C.

Employee errors

D.

Theft

Question 93

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

nc 208.100.2.25 23

B.

nc -v -n 208.100.2.25 80

C.

nmap -v -O 208.100.2.25

D.

nmap -v -O www.we-are-secure.com

Question 94

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Data service

B.

Account service

C.

Ticket-granting service

D.

Authentication service

Question 95

Which of the following provides high availability of data?

Options:

A.

RAID

B.

Anti-virus software

C.

Backup

D.

EFS

Question 96

Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Integrity

B.

Privacy

C.

Confidentiality

D.

Availability

Question 97

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

TCP FTP proxy scanning

B.

Eavesdropping

C.

Web ripping

D.

Fingerprinting

Question 98

Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?

Options:

A.

ARP

B.

TCP

C.

ICMP

D.

IGMP

Page: 1 / 66
Total 659 questions