Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?
A. DNS server
B. Firewall
C. Proxy server
D. WINS server
A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.
A. Man-in-the-middle
B. Brute force
C. Denial of Service (DoS)
D. Dictionary
Which of the following statements about DES (Data Encryption Standard) is true?
A. Its most widely used symmetric encryption algorithm uses a 56-bit key.
B. Its most widely used symmetric encryption algorithm uses a 32-bit key.
C. Its most widely used symmetric encryption algorithm uses a 128-bit key.
D. Its most widely used symmetric encryption algorithm uses a 64-bit key.
Which of the following is not a level of military data-classification system?
A. Unclassified
B. Normal
C. Confidential
D. Top secret
Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?
A. Single Loss Expectancy x Annualized Rate of Occurrence
B. ALE before implementing safeguard + ALE after implementing safeguard + annual cost of safeguard
C. ALE before implementing safeguard - ALE after implementing safeguard - annual cost of safeguar
D. Asset Value x Exposure factor
Which of the following are examples of passive attacks? Each correct answer represents a complete solution. Choose all that apply.
A. Shoulder surfing
B. Dumpster diving
C. Placing a backdoor
D. Eavesdropping
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.
A. Data service
B. Account service
C. Authentication service
D. Ticket-granting service
Which of the following is a reason to implement security logging on a DNS server?
A. For monitoring unauthorized zone transfer
B. For preventing malware attacks on a DNS server
C. For recording the number of queries resolved
D. For measuring a DNS server's performance
Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.
A. Technical
B. Administrative
C. Automatic
D. Physical
Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?
A. 64-bit
B. 16-bit
C. 32-bit
D. 128-bit
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GISP exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.