Which of the following protocols is used with a tunneling protocol to provide security?
A. EAP
B. IPSec
C. FTP
D. IPX/SPX
Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?
A. Snooping
B. Phishing
C. SYN attack
D. Spoofing
Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.
A. Blackbox testing
B. Port redirection
C. Firewalking
D. Brainstorming
On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?
A. Session layer
B. Transport layer
C. Application layer
D. Data-link layer
In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?
A. ARP spoofing
B. Replay
C. Brute force
D. MAC duplicating
Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?
A. Spoofing
B. System hardening
C. Shielding
D. Auditing
An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?
A. Biometrics
B. Anonymous
C. Mutual
D. Multi-factor
Which of the following tools can be used by a user to hide his identity? Each correct answer represents a complete solution. Choose all that apply.
A. War dialer
B. IPchains
C. Anonymizer
D. Proxy server
E. Rootkit
Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?
A. Corroborating
B. Circumstantial
C. Direct
D. Incontrovertible
Which of the following are the phases of the Certification and Accreditation (CandA) process? Each correct answer represents a complete solution. Choose two.
A. Auditing
B. Initiation
C. Detection
D. Continuous Monitoring
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GISP exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.