Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

GISP Sample Questions Answers

Questions 4

Which of the following provides the best protection against a man-in-the-middle attack?

Options:

A.

Fiber-optic cable

B.

Strong password

C.

Strong encryption

D.

Firewall

Buy Now
Questions 5

Which of the following needs to be documented to preserve evidences for presentation in court?

Options:

A.

Separation of duties

B.

Account lockout policy

C.

Chain of custody

D.

Incident response policy

Buy Now
Questions 6

Which of the following statements about the bridge are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It filters traffic based on IP addresses.

B.

It filters traffic based on MAC addresses.

C.

It assigns a different network address per port.

D.

It forwards broadcast packets.

Buy Now
Questions 7

Which of the following is used by attackers to obtain an authenticated connection on a network?

Options:

A.

Back door

B.

Replay attack

C.

Denial-of-Service (DoS) attack

D.

Man-in-the-middle attack

Buy Now
Questions 8

Which of the following statements about Network Address Translation (NAT) is true?

Options:

A.

It hides the public network from internal hosts.

B.

It hides internal hosts from the public network.

C.

It uses public IP addresses on an internal network.

D.

It translates IP addresses into user friendly names.

Buy Now
Questions 9

Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?

Options:

A.

Spam

B.

Artistic license

C.

Patent

D.

Phishing

Buy Now
Questions 10

Which of the following protocols implements VPN using IPSec?

Options:

A.

L2TP

B.

SLIP

C.

PPP

D.

PPTP

Buy Now
Questions 11

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Eavesdropping

B.

Dumpster diving

C.

Placing a backdoor

D.

Shoulder surfing

Buy Now
Questions 12

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Worm

B.

Biometrics

C.

Denial-of-Service (DoS)

D.

Trojan horse

Buy Now
Questions 13

You work as a Web Administrator for Perfect World Inc. The company is planning to host an Ecommerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Use the EAP protocol.

B.

Use the SSL protocol.

C.

Use Basic authentication.

D.

Use encrypted authentication.

Buy Now
Questions 14

Fill in the blanks with the appropriate values.

International Data Encryption Algorithm (IDEA) is a _____ -bit block cipher that uses a ________-bit key.

Options:

A.

64,128

Buy Now
Questions 15

Which of the following are considered Bluetooth security violations?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Social engineering

B.

Bluesnarfing

C.

SQL injection attack

D.

Bluebug attack

E.

Cross site scripting attack

Buy Now
Questions 16

Which of the following viruses masks itself from applications or utilities to hide itself by detection of anti-virus software?

Options:

A.

Macro virus

B.

E-mail virus

C.

Stealth virus

D.

Polymorphic virus

Buy Now
Questions 17

Which of the following classes of fire comes under Class C fire?

Options:

A.

Combustible metals fire

B.

Paper or wood fire

C.

Oil fire

D.

Electronic or computer fire

Buy Now
Questions 18

Fill in the blank with the appropriate value.

Twofish symmetric key block cipher operates on 128-bits block size using key sizes up to______ bits.

Options:

A.

256

Buy Now
Questions 19

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Knowledge-based detection

B.

Statistical anomaly detection

C.

Pattern matching detection

D.

Protocol detection

Buy Now
Questions 20

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?

Options:

A.

Microsoft Point-to-Point Encryption (MPPE)

B.

Pretty Good Privacy (PGP)

C.

Data Encryption Standard (DES)

D.

IP Security (IPSec)

Buy Now
Questions 21

Which of the following types of evidence is considered as the best evidence?

Options:

A.

A copy of the original document

B.

A computer-generated record

C.

Information gathered through the witness's senses

D.

The original document

Buy Now
Questions 22

Which of the following is NOT a countermeasure against a spoofing attack?

Options:

A.

Patching operating system

B.

Installing Anti-virus software

C.

Patching application

D.

Employing IDS

Buy Now
Questions 23

Which of the following types of coaxial cable is used for cable TV and cable modems?

Options:

A.

RG-62

B.

RG-59

C.

RG-8

D.

RG-58

Buy Now
Questions 24

Which of the following encryption strengths is used to secure NTLM version 2 passwords?

Options:

A.

56-bit

B.

32-bit

C.

128-bit

D.

64-bit

Buy Now
Questions 25

Which of the following port numbers is used by the HTTPS protocol for secure Web transmission?

Options:

A.

8080

B.

21

C.

110

D.

443

E.

80

F.

25

Buy Now
Questions 26

Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

Options:

A.

Snooping

B.

Phishing

C.

SYN attack

D.

Spoofing

Buy Now
Questions 27

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

Options:

A.

Piggybacking

B.

Hacking

C.

Session hijacking

D.

Keystroke logging

Buy Now
Questions 28

Which of the following is the rating for electronic or computer fires?

Options:

A.

Class B

B.

Class C

C.

Class D

D.

Class A

Buy Now
Questions 29

Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?

Options:

A.

DNS server

B.

Firewall

C.

Proxy server

D.

WINS server

Buy Now
Questions 30

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Building Risk free systems

B.

Risk control

C.

Risk identification

D.

Assuring the integrity of organizational data

Buy Now
Questions 31

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

Options:

A.

Biometrics

B.

Anonymous

C.

Mutual

D.

Multi-factor

Buy Now
Questions 32

Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?

Options:

A.

LMHOSTS

B.

Bastion host

C.

Firewall

D.

Gateway

Buy Now
Questions 33

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails.

Which of the following will you use to accomplish this?

Options:

A.

PPTP

B.

IPSec

C.

PGP

D.

NTFS

Buy Now
Questions 34

Which of the following statements about certification authority (CA) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is an entity in a network, which manages security credentials and public keys for message encryption.

B.

It issues certificates that confirm the identity and other attributes of a certificate in relation to other entities.

C.

It is an entity in a network, which manages files and objects.

D.

It issues private keys that confirm the identity and other attributes of a certificate in relation to other entities.

Buy Now
Questions 35

Which of the following access control models requires centralize database of user accounts?

Options:

A.

User based

B.

Data based

C.

Group based

D.

Partitions based

Buy Now
Questions 36

Which of the following is the default port for Simple Network Management Protocol (SNMP)?

Options:

A.

TCP port 80

B.

TCP port 110

C.

TCP port 25

D.

UDP port 161

Buy Now
Questions 37

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

Options:

A.

Brute force attack

B.

SYN attack

C.

Spoofing

D.

PING attack

Buy Now
Questions 38

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

He should upgrade his antivirus program.

B.

He should restore his Windows settings.

C.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

Buy Now
Questions 39

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Options:

A.

Tunneling

B.

Spoofing

C.

Packet filtering

D.

Packet sniffing

Buy Now
Questions 40

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

Options:

A.

Chain of custody

B.

Evidence access policy

C.

Chain of evidence

D.

Incident response policy

Buy Now
Questions 41

Which of the following VPN protocols offer encryption?

Each correct answer represents a complete solution. Choose two.

Options:

A.

L2F

B.

PPTP

C.

L2TP

D.

IPSec

Buy Now
Questions 42

Which of the following statements about Dynamic Host Configuration Protocol (DHCP) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is used to provide host name resolution in a TCP/IP-based network.

B.

It is used to dynamically assign IP addresses to computers.

C.

It reduces the complexity of managing network client IP address configuration.

D.

It reduces the risk of a denial of service (DoS) attack.

Buy Now
Questions 43

Which of the following is ensured by the concept of availability in information system security?

Options:

A.

Data modifications are not made by an unauthorized user or process.

B.

The intentional or unintentional unauthorized disclosure of a message or important document contents is prevented.

C.

The systems are up and running when they are needed.

D.

Unauthorized modifications are not made by authorized users.

Buy Now
Questions 44

Which of the following statements about asymmetric encryption are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Asymmetric encryption uses a public key and a private key pair for data encryption.

B.

Asymmetric encryption is faster as compared to symmetric encryption.

C.

In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.

D.

In asymmetric encryption, only one key is needed to encrypt and decrypt data.

Buy Now
Questions 45

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

HTTP

B.

SSL

C.

SNMP

D.

TLS

Buy Now
Questions 46

Which of the following protocols work at the Network layer of the OSI model?

Options:

A.

Routing Information Protocol (RIP)

B.

Internet Group Management Protocol (IGMP)

C.

Simple Network Management Protocol (SNMP)

D.

File Transfer Protocol (FTP)

Buy Now
Questions 47

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For measuring a DNS server's performance

B.

For recording the number of queries resolved

C.

For preventing malware attacks on a DNS server

D.

For monitoring unauthorized zone transfer

Buy Now
Questions 48

Which of the following are the common roles with regard to data in an information classification program?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

User

B.

Owner

C.

Custodian

D.

Security auditor

E.

Editor

Buy Now
Questions 49

Which of the following is the default port for TACACS?

Options:

A.

UDP port 49

B.

TCP port 443

C.

TCP port 25

D.

TCP port 80

Buy Now
Questions 50

Identify whether the given statement is true or false.

"Social engineering is the art of convincing people and making them disclose useful information such as account names and passwords."

Options:

A.

False

B.

True

Buy Now
Questions 51

Which of the following protocols is used to send e-mails on the Internet?

Options:

A.

HTTP

B.

IMAP4

C.

SMTP

D.

POP3

Buy Now
Questions 52

Which of the following types of activities can be audited for security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Data downloading from the Internet

B.

Network logons and logoffs

C.

File and object access

D.

Printer access

Buy Now
Questions 53

Brutus is a password cracking tool that can be used to crack the following authentications:

•HTTP (Basic Authentication)

•HTTP (HTML Form/CGI)

•POP3 (Post Office Protocol v3)

•FTP (File Transfer Protocol)

•SMB (Server Message Block)

•Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dictionary attack

B.

Brute force attack

C.

Replay attack

D.

Hybrid attack

E.

Man-in-the-middle attack

Buy Now
Questions 54

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _____ layer of the OSI model.

Options:

A.

transport

Buy Now
Questions 55

Which of the following is known as a message digest?

Options:

A.

Message authentication code

B.

Hash function

C.

Hashing algorithm

D.

Spider

Buy Now
Questions 56

Which of the following is the default port for Secure Shell (SSH)?

Options:

A.

TCP port 443

B.

UDP port 161

C.

UDP port 138

D.

TCP port 22

Buy Now
Questions 57

Which of the following technologies are forms of single sign-on (SSO)?

Each correct answer represents a complete solution. Choose three.

Options:

A.

CoSign

B.

SESAME

C.

Kerberos

D.

RADIUS

Buy Now
Questions 58

Which of the following are the centralized administration technologies?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

RADIUS

B.

TACACS+

C.

Peer-to-Peer

D.

Media Access control

Buy Now
Questions 59

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Options:

A.

PGP

B.

Symmetric

C.

S/MIME

D.

Asymmetric

Buy Now
Questions 60

Key escrow is a method of __________.

Options:

A.

Key renewal

B.

Key distribution

C.

Key recovery

D.

key revocation

Buy Now
Questions 61

Which of the following classes of fire comes under Class C fire?

Options:

A.

Combustible metals fire

B.

Paper or wood fire

C.

Oil fire

D.

Electronic or computer fire

Buy Now
Questions 62

Which of the following are politically motivated threats that an organization faces?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Power distribution outages

B.

Civil disobedience

C.

Riot

D.

Vandalism

E.

Terrorist attacks

Buy Now
Questions 63

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

IPSec

B.

S/MIME

C.

PGP

D.

TLS

Buy Now
Questions 64

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Buy Now
Questions 65

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

Options:

A.

RAID-1

B.

RAID-4

C.

RAID-3

D.

RAID-0

E.

RAID-5

Buy Now
Questions 66

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.

Backup policy

B.

Network security policy

C.

Privacy policy

D.

User password policy

Buy Now
Questions 67

Which of the following is a term that refers to unsolicited e-mails sent to a large number of e-mail users?

Options:

A.

Hotfix

B.

Buffer overflow

C.

Biometrics

D.

Spam

Buy Now
Questions 68

Which of the following defines the communication link between a Web server and Web applications?

Options:

A.

Firewall

B.

IETF

C.

CGI

D.

PGP

Buy Now
Questions 69

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

Options:

A.

Spoofing

B.

Auditing

C.

Shielding

D.

System hardening

Buy Now
Questions 70

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Data service

B.

Account service

C.

Authentication service

D.

Ticket-granting service

Buy Now
Questions 71

Which of the following are advantages of NTFS file system over FAT32 and FAT?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Support for file and folder level permissions.

B.

Support for dual-booting.

C.

Support for Encrypting File System (EFS).

D.

Support for audio files.

Buy Now
Questions 72

You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NTFS gives better file security than FAT16 and FAT32.

B.

NTFS file system supports for larger hard disks.

C.

NTFS give improved disk compression than FAT16 and FAT32.

D.

Automatic backup.

Buy Now
Questions 73

Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?

Options:

A.

Single Loss Expectancy x Annualized Rate of Occurrence

B.

ALE before implementing safeguard + ALE after implementing safeguard + annual cost of safeguard

C.

ALE before implementing safeguard - ALE after implementing safeguard - annual cost of safeguar

D.

Asset Value x Exposure factor

Buy Now
Questions 74

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Shoulder surfing

B.

Dumpster diving

C.

Placing a backdoor

D.

Eavesdropping

Buy Now
Questions 75

Which of the following activities is used to take place after recording and registering an incident?

Options:

A.

Restoring

B.

Matching

C.

Analysis

D.

Classification

Buy Now
Questions 76

Which of the following devices reads the destination's MAC address from each incoming data packet and forwards the data packet to its destination?

Options:

A.

Brouter

B.

Router

C.

Hub

D.

Switch

Buy Now
Questions 77

The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from children under __ years of age without verifiable permission of a parent?

Options:

A.

15

B.

13

C.

10

D.

21

E.

18

Buy Now
Questions 78

The _______ protocol allows applications to communicate across a network in a way designed to prevent eavesdropping and message forgery.

Options:

A.

PPP

B.

TCP

C.

EAP

D.

TLS

Buy Now
Questions 79

Which of the following is the rating for gasoline or oil fires?

Options:

A.

Class B

B.

Class D

C.

Class A

D.

Class C

Buy Now
Questions 80

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Protocol detection

B.

Statistical anomaly detection

C.

Pattern matching detection

D.

Knowledge-based detection

Buy Now
Questions 81

International Data Encryption Algorithm (IDEA) is a __________ block cipher.

Options:

A.

32-bit

B.

128-bit

C.

16-bit

D.

64-bit

Buy Now
Questions 82

In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

Options:

A.

ARP spoofing

B.

Replay

C.

Brute force

D.

MAC duplicating

Buy Now
Questions 83

Which of the following is a type of halon?

Options:

A.

Halon C

B.

Halon 1900

C.

Halon 1301

D.

Halon 1300

Buy Now
Questions 84

__________ is the process of verifying the identity of a user and obtaining required evidences from the user.

Options:

A.

Verification

B.

Impersonation

C.

Authentication

D.

Authorization

Buy Now
Questions 85

Which of the following task force was formed to examine the impact of Electronic Publishing on the intellectual property rights?

Options:

A.

The IIPTF (International Intellectual Property Task Force)

B.

The EPTF (Electronic Publishing Task Force)

C.

The LATF (Langham Act Task Force)

D.

The IITF (Information Infrastructure Task Force)

Buy Now
Questions 86

Which term best describes an e-mail that contains incorrect and misleading information or warnings about viruses?

Options:

A.

Hoax

B.

Spam

C.

Trojan horse

D.

Virus

E.

Rlogin

F.

Blowfish

Buy Now
Questions 87

Which of the following is not a level of military data-classification system?

Options:

A.

Unclassified

B.

Normal

C.

Confidential

D.

Top secret

Buy Now
Questions 88

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Collusion

B.

Eavesdropping

C.

Phishing

D.

Buffer overflow

Buy Now
Questions 89

The TCP/IP protocol suite uses ____ to identify which service a certain packet is destined for.

Options:

A.

MAC addresses

B.

Port numbers

C.

Subnet masks

D.

IP addresses

Buy Now
Questions 90

Which of the following services are provided by Remote Authentication Dial-In User Service (RADIUS)?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Authentication

B.

Data encryption

C.

Authorization

D.

Accounting

Buy Now
Questions 91

Which of the following are tunneling protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

SMTP

B.

NNTP

C.

L2TP

D.

PPTP

Buy Now
Questions 92

Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?

Options:

A.

CHAP

B.

PAP

C.

EAP

D.

MS-CHAP v2

Buy Now
Questions 93

Which of the following IP addresses are private addresses?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

10.0.0.3

B.

192.168.15.2

C.

192.166.54.32

D.

19.3.22.17

Buy Now
Questions 94

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Physical layer

B.

The Network layer

C.

The Data-Link layer

D.

The Presentation layer

Buy Now
Questions 95

Which of the following processes removes data from the media so that it is difficult to restore?

Options:

A.

Overwriting

B.

Degaussing

C.

Sanitization

D.

Declassification

Buy Now
Questions 96

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Corroborating

B.

Circumstantial

C.

Direct

D.

Incontrovertible

Buy Now
Questions 97

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Spoofing

B.

Cryptanalysis

C.

Steganography

D.

Packet sniffing

Buy Now
Questions 98

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:

A.

Visitors

B.

Customers

C.

Employees

D.

Hackers

Buy Now
Questions 99

Which of the following is an industry standard authentication protocol commonly used in UNIX networks?

Options:

A.

TACACS

B.

IPX

C.

SMTP

D.

MS-CHAP

Buy Now
Questions 100

Fill in the blank with the appropriate value.

Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.

Options:

A.

32

Buy Now
Questions 101

On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?

Options:

A.

Session layer

B.

Transport layer

C.

Application layer

D.

Data-link layer

Buy Now
Questions 102

What are the benefits of using a proxy server on a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It enhances network security.

B.

It cuts down dial-up charges.

C.

It is used for automated assignment of IP addresses to a TCP/IP client in the domain.

D.

It uses a single registered IP address for multiple connections to the Internet.

Buy Now
Questions 103

Fill in the blanks with the appropriate values.

International Data Encryption Algorithm (IDEA) is a _____ -bit block cipher that uses a ________-bit key.

Options:

A.

64,128

Buy Now
Questions 104

Which of the following devices performs protocol and format translations?

Options:

A.

Switch

B.

Modem

C.

Gateway

D.

Repeater

Buy Now
Questions 105

Which of the following processes is known as Declassification?

Options:

A.

Verifying the identity of a person, network host, or system process.

B.

Physically destroying the media and the information stored on it.

C.

Assessing the risk involved in making a confidential document available to public.

D.

Removing the content from the media so that it is difficult to restore.

Buy Now
Questions 106

On which of the following OSI model layers does IPSec operate?

Options:

A.

Data-link layer

B.

Physical layer

C.

Session layer

D.

Network layer

Buy Now
Questions 107

Which of the following protocols provides maintenance and error reporting function?

Options:

A.

ICMP

B.

IGMP

C.

PPP

D.

UDP

Buy Now
Questions 108

Which of the following is used by attackers to obtain an authenticated connection on a network?

Options:

A.

Denial-of-Service (DoS) attack

B.

Replay attack

C.

Man-in-the-middle attack

D.

Back door

Buy Now
Questions 109

Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Integrity

B.

Privacy

C.

Confidentiality

D.

Availability

Buy Now
Questions 110

Which of the following protocols work at the network layer?

Each correct answer represents a complete solution. Choose three.

Options:

A.

OSPF

B.

SPX

C.

IGMP

D.

RIP

Buy Now
Questions 111

John works as an Ethical Hacker for PassGuide Inc. He wants to find out the ports that are open in PassGuide's server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?

Options:

A.

TCP SYN

B.

TCP SYN/ACK

C.

TCP FIN

D.

Xmas tree

Buy Now
Questions 112

Which of the following protocols uses TCP port 22 as the default port and operates at the application layer?

Options:

A.

Secure Sockets Layer (SSL)

B.

Secure Shell (SSH)

C.

Post Office Protocol version 3 (POP3)

D.

Trivial File Transfer Protocol (TFTP)

Buy Now
Questions 113

Which of the following layers protocols handles file transfer and network management?

Options:

A.

Application

B.

Transport

C.

Presentation

D.

Session

Buy Now
Questions 114

Which of the following are the primary components of a discretionary access control (DAC) model?

Each correct answer represents a complete solution. Choose two.

Options:

A.

User's group

B.

Access rights and permissions

C.

File and data ownership

D.

Smart card

Buy Now
Questions 115

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Physical layer

B.

The Network layer

C.

The Data-Link layer

D.

The Presentation layer

Buy Now
Questions 116

Which of the following involves identifying and minimizing the effect of risks?

Options:

A.

Risk profile

B.

Recovery plan

C.

Risk plan

D.

Risk retention

Buy Now
Questions 117

How many keys are used to encrypt data in symmetric encryption?

Options:

A.

Four

B.

One

C.

Two

D.

Three

Buy Now
Questions 118

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Buffer overflow

B.

Collusion

C.

Phishing

D.

Eavesdropping

Buy Now
Questions 119

Which of the following is the new permissions model in Microsoft Exchange Server 2010, which enables you to control, at broad and granular levels, what administrators and end-users can do?

Options:

A.

Dynamic distribution group

B.

Universal distribution group

C.

Role Based Access Control

D.

Access Control List

Buy Now
Questions 120

Fill in the blanks with the appropriate values.

International Data Encryption Algorithm (IDEA) is a ______ -bit block cipher that uses a _____-bit key.

Options:

A.

64,128

Buy Now
Questions 121

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

TCP FTP proxy scanning

B.

Eavesdropping

C.

Web ripping

D.

Fingerprinting

Buy Now
Questions 122

Which of the following features of a switch helps to protect network from MAC flood and MAC spoofing?

Options:

A.

Port security

B.

Multi-Authentication

C.

Quality of Service (QoS)

D.

MAC Authentication Bypass

Buy Now
Questions 123

Which of the following access control models uses a role based method to determine access rights and permission?

Options:

A.

Discretionary access control

B.

Roaming access control

C.

Nondiscretionary access control

D.

Mandatory access control

Buy Now
Questions 124

Which of the following is the most secure authentication method?

Options:

A.

Certificate-based authentication

B.

Basic authentication

C.

Digest authentication

D.

Integrated Windows authentication

Buy Now
Questions 125

Which of the following types of attacks slows down or stops a server by overloading it with requests?

Options:

A.

Vulnerability attack

B.

Impersonation attack

C.

Network attack

D.

DoS attack

Buy Now
Questions 126

Which of the following are methods used for authentication?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Smart card

B.

Biometrics

C.

Username and password

D.

Magnetic stripe card

Buy Now
Questions 127

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided laptops to its sales team members. You have configured access points in the network to enable a wireless network. The company's security policy states that all users using laptops must use smart cards for authentication. Which of the following authentication techniques will you use to implement the security policy of the company?

Options:

A.

IEEE 802.1X using EAP-TLS

B.

Pre-shared key

C.

IEEE 802.1X using PEAP-MS-CHAP

D.

Open system

Buy Now
Questions 128

Which of the following components come under the network layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Firewalls

B.

Hub

C.

Routers

D.

MAC addresses

Buy Now
Questions 129

Which of the following statements about Network Address Translation (NAT) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It allows the computers in a private network to share a global, ISP assigned address to connect to the Internet.

B.

It reduces the need for globally unique IP addresses.

C.

It allows external network clients access to internal services.

D.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

Buy Now
Questions 130

Which of the following layers of the OSI model provides end-to-end service?

Options:

A.

The physical layer

B.

The application layer

C.

The session layer

D.

The transport layer

Buy Now
Questions 131

Which of the following policies is set by a network administrator to allow users to keep their emails and documents for a fixed period of time?

Options:

A.

Retention policy

B.

Password policy

C.

Audit policy

D.

Backup policy

Buy Now
Questions 132

Which of the following statements about Discretionary Access Control List (DACL) is true?

Options:

A.

It is a rule list containing access control entries.

B.

It specifies whether an audit activity should be performed when an object attempts to access a resource.

C.

It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.

D.

It is a unique number that identifies a user, group, and computer account.

Buy Now
Questions 133

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Options:

A.

Social engineering attack

B.

Password guessing attack

C.

Mail bombing

D.

Cross site scripting attack

Buy Now
Questions 134

Mark the list that mentions the correct levels of classification of the military data-classification system.

Options:

A.

未命名-4

Buy Now
Questions 135

Which of the following is the best way of protecting important data against virus attack?

Options:

A.

Updating the anti-virus software regularly.

B.

Taking daily backup of data.

C.

Using strong passwords to log on to the network.

D.

Implementing a firewall.

Buy Now
Questions 136

Which of the following statements about extranet are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is an area of a company's Web site, which is only available to selected customers, suppliers, an business partners.

B.

It is an area of a company's Web site, which is available to Internet users.

C.

It is an arrangement commonly used for business-to-business relationships.

D.

It is an arrangement commonly used for a company's employees.

Buy Now
Questions 137

Which of the following languages enable programmers to store cookies on client computers?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Perl

B.

DHTML

C.

JavaScript

D.

HTML

Buy Now
Questions 138

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

Options:

A.

Cross site scripting

B.

Man-in-the-middle attack

C.

Cookie poisoning

D.

Computer-based social engineering

Buy Now
Questions 139

Which of the following rate systems of Orange book has mandatory protection of the Trusted Computing Base (TCB)?

Options:

A.

B-rated system

B.

A-rated system

C.

D-rated system

D.

C-Rated system

Buy Now
Questions 140

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domainbased network. The company has two offices in different cities. The offices are connected through the Internet. Both offices have a Windows 2003 server named SERV1 and SERV2 respectively. Mark is required to create a secure connection between both offices. He configures a VPN connection between the offices using the two servers. He uses L2TP for VPN and also configures an IPSec tunnel. Which of the following will he achieve with this configuration?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Highest possible encryption for traffic between the offices

B.

Encryption for the local files stored on the two servers

C.

Extra bandwidth on the Internet connection

D.

Mutual authentication between the two servers

Buy Now
Questions 141

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

Options:

A.

Session splicing attack

B.

Evasion attack

C.

Insertion attack

D.

Polymorphic shell code attack

Buy Now
Questions 142

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser 's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?

Options:

A.

The site's Web server has heavy traffic.

B.

The site's Web server is offline.

C.

WINS server has no NetBIOS name entry for the server.

D.

DNS entry is not available for the host name.

Buy Now
Questions 143

Which of the following functions are performed by a firewall?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It hides vulnerable computers that are exposed to the Internet.

B.

It logs traffic to and from the private network.

C.

It enhances security through various methods, including packet filtering, circuit-level filtering, and application filtering.

D.

It blocks unwanted traffic.

Buy Now
Questions 144

Which of the following statements are true about a Gantt chart?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It displays the duration of a task.

B.

It is easier to plan than PERT.

C.

It displays dependencies between activities.

D.

The impact of slippage is easily determined.

Buy Now
Questions 145

Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?

Options:

A.

Type II

B.

Type I

C.

Type III

D.

Type IV

Buy Now
Questions 146

Which of the following categories of UTP cable has maximum data transfer rate of 155 Mbps?

Options:

A.

Category 5

B.

Category 3

C.

Category 7

D.

Category 6

Buy Now
Questions 147

Which of the following are tunneling protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

NNTP

B.

SMTP

C.

L2TP

D.

PPTP

Buy Now
Questions 148

Which of the following statements about the bridge are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It filters traffic based on IP addresses.

B.

It forwards broadcast packets.

C.

It assigns a different network address per port.

D.

It filters traffic based on MAC addresses.

Buy Now
Questions 149

Against which of the following does SSH provide protection?

Each correct answer represents a complete solution. Choose two.

Options:

A.

DoS attack

B.

Password sniffing

C.

Broadcast storm

D.

IP spoofing

Buy Now
Questions 150

What will be the best strategy to prevent employees on a Local Area Network from performing unauthorized activities?

Options:

A.

Grant the employees minimum permissions that are needed to perform the required tasks.

B.

Limit the number of files that any employee can open at any given time.

C.

Grant the employees maximum permissions that are needed to perform the required tasks.

D.

Store the resources on a hard disk that has NTFS partitions.

Buy Now
Questions 151

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?

Options:

A.

RAID-1

B.

RAID-10

C.

RAID-0

D.

RAID-5

Buy Now
Questions 152

Which of the following protocols is used to establish a secure TELNET session over TCP/IP?

Options:

A.

SSL

B.

PGP

C.

IPSEC

D.

SSH

Buy Now
Questions 153

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet?

Options:

A.

UDP

B.

HTTP

C.

SSL

D.

IPSec

Buy Now
Questions 154

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The mutation engine of the virus is generating a new encrypted code.

B.

John has changed the signature of the virus.

C.

The virus, used by John, is not in the database of the antivirus program installed on the server.

D.

John has created a new virus.

Buy Now
Questions 155

Which of the following are used to suppress gasoline and oil fires?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Water

B.

CO2

C.

Halon

D.

Soda acid

Buy Now
Questions 156

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

He should upgrade his antivirus program.

B.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

C.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.

He should restore his Windows settings.

Buy Now
Questions 157

Which of the following terms is used for securing an operating system from an attack?

Options:

A.

System hacking

B.

System hardening

C.

System mirroring

D.

System indexing

Buy Now
Questions 158

Which of the following refers to going through someone's trash to find out useful or confidential information?

Options:

A.

Dumpster diving

B.

Hacking

C.

Phishing

D.

Spoofing

Buy Now
Questions 159

Which of the following defines the communication link between a Web server and Web applications?

Options:

A.

PGP

B.

CGI

C.

IETF

D.

Firewall

Buy Now
Questions 160

Which of the following are the examples of administrative controls?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Data Backup

B.

Auditing

C.

Security policy

D.

Security awareness training

Buy Now
Questions 161

Which of the following attacks involves multiple compromised systems to attack a single target?

Options:

A.

Brute force attack

B.

DDoS attack

C.

Dictionary attack

D.

Replay attack

Buy Now
Questions 162

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Collusion

B.

Eavesdropping

C.

Buffer overflow

D.

Phishing

Buy Now
Questions 163

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

WEP uses the RC4 encryption algorithm.

B.

The Initialization Vector (IV) field of WEP is only 24 bits long.

C.

Automated tools such as AirSnort are available for discovering WEP keys.

D.

It provides better security than the Wi-Fi Protected Access protocol.

Buy Now
Questions 164

Fill in the blanks with the appropriate values.

Twofish symmetric algorithm operates on _______ -bit blocks and can support a key length of up to ________ bits.

Options:

A.

128,256

Buy Now
Questions 165

Which of the following is a term used to refer to access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?

Options:

A.

Mail bombing

B.

Piggybacking

C.

Spoofing

D.

Snooping

Buy Now
Questions 166

Which of the following safes are large enough to allow a person to enter?

Options:

A.

Wall safes

B.

Floor safes

C.

Vaults

D.

Chests

Buy Now
Questions 167

Which of the following records everything a person types using the keyboard?

Options:

A.

Line conditioner

B.

Firewall

C.

Port scanner

D.

Keystroke logger

Buy Now
Questions 168

Which of the following layers are the sub layers of the data-link layer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Media Access Control (MAC)

B.

Logical Link Control (LLC)

C.

Reserve Address Resolution Protocol (RARP)

D.

Serial Line Internet Protocol (SLIP)

Buy Now
Questions 169

Which of the following languages is a fourth-generation language?

Options:

A.

FORTRAN

B.

Assembly

C.

C+

D.

SQL

Buy Now
Questions 170

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Technical

B.

Administrative

C.

Automatic

D.

Physical

Buy Now
Questions 171

Which of the following are threats to network security?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Dial-up connections

B.

Rogue employees

C.

Disabled user accounts

D.

Events auditing

Buy Now
Questions 172

How long are cookies in effect if no expiration date is set?

Options:

A.

Forever

B.

Until the session ends.

C.

Fifteen days

D.

One year

Buy Now
Questions 173

Which of the following are default ports for the FTP service?

Each correct answer represents a complete solution. Choose two.

Options:

A.

443

B.

20

C.

21

D.

80

Buy Now
Questions 174

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

Options:

A.

Wiretapping

B.

Spoofing

C.

Data diddling

D.

Eavesdropping

Buy Now
Questions 175

Which of the following statements about the authentication concept of information security management is true?

Options:

A.

It ensures the reliable and timely access to resources.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes.

C.

It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.

D.

It establishes the users' identity and ensures that the users are who they say they are.

Buy Now
Questions 176

Which of the following statements is true about auditing?

Options:

A.

It is used to track user accounts for file and object access, logon attempts, etc.

B.

It is used to prevent unauthorized access to network resources.

C.

It is used to protect the network against virus attacks.

D.

It is used to secure the network or the computers on the network.

Buy Now
Questions 177

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

•It displays the signal strength of a wireless network, MAC address, SISD, channel details, etc.

•It is commonly used for the following purposes:

a. War driving

b. Detecting unauthorized access points

c. Detecting causes of interference on a WLAN

d. WEP ICV error tracking

e. Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

Options:

A.

Kismet

B.

NetStumbler

C.

Absinthe

D.

THC-Scan

Buy Now
Questions 178

Which of the following refers to the emulation of the identity of a network computer by an attacking computer?

Options:

A.

Hacking

B.

PING attack

C.

Spoofing

D.

SYN attack

Buy Now
Questions 179

Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

Options:

A.

Port Address Translation (PAT)

B.

Dynamic NAT

C.

Static NAT

D.

Cache NAT

Buy Now
Questions 180

Which of the following statements about a certificate is true?

Options:

A.

A certificate is a method of encryption used to send mails.

B.

A certificate is used to protect intranets against virus attacks.

C.

A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.

D.

A certificate is a digital representation of information that identifies unauthorized communication packets on the Internet and intranets.

Buy Now
Questions 181

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He enters a single quote in the input field of the login page of the Weare- secure Web site and receives the following error message:

Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'

This error message shows that the We-are-secure Website is vulnerable to __________.

Options:

A.

A Denial-of-Service attack

B.

A SQL injection attack

C.

An XSS attack

D.

A buffer overflow

Buy Now
Questions 182

Which of the following statements is true about a polymorphic virus?

Options:

A.

It is a type of virus that removes access permissions from files.

B.

This type of virus hides system files.

C.

It copies itself onto the boot sector of hard disk drives.

D.

It has the ability to change its own signature at the time of infection.

Buy Now
Questions 183

Which of the following statement about snooping is true?

Options:

A.

It occurs when an unauthorized user tries to log on repeatedly to a computer or network by guessing usernames and passwords.

B.

It is an activity of observing the content that appears on a computer monitor or watching what a user is typing.

C.

It is a technique that makes a transmission appear to have come from an authentic source by forging the IP address.

D.

It is the art of convincing people and making them disclose useful information such as account names and passwords.

Buy Now
Questions 184

Which of the following layers of the OSI model provides non-repudiation services?

Options:

A.

The application layer

B.

The data-link layer

C.

The presentation layer

D.

The physical layer

Buy Now
Questions 185

Which of the following are the basic architectures of microprocessors used in modern computers?

Each correct answer represents a complete solution. Choose two.

Options:

A.

ASCII

B.

RISC

C.

CISC

D.

PCIe

Buy Now
Questions 186

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

Options:

A.

RAID-5

B.

RAID-0

C.

RAID-4

D.

RAID-3

E.

RAID-1

Buy Now
Questions 187

How many keys are used to encrypt data in symmetric encryption?

Options:

A.

Two

B.

Three

C.

Four

D.

One

Buy Now
Questions 188

Which of the following is an open source network intrusion detection system?

Options:

A.

Sourcefire

B.

NETSH

C.

Macof

D.

Snort

Buy Now
Questions 189

Which of the following protocols is responsible for requesting Web pages from a Web server and sending back the responses to the Web browser?

Options:

A.

IP

B.

FTP

C.

HTTP

D.

PPP

Buy Now
Questions 190

Which of the following access control models uses a predefined set of access privileges for an object of a system?

Options:

A.

Policy Access Control

B.

Mandatory Access Control

C.

Role-Based Access Control

D.

Discretionary Access Control

Buy Now
Questions 191

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

Options:

A.

Biometrics

B.

Anonymous

C.

Mutual

D.

Multi-factor

Buy Now
Questions 192

Which of the following ports is assigned by the Internet Assigned Number Authority (IANA) for RADIUS accounting?

Options:

A.

TCP/UDP port 992

B.

TCP/UDP port 1813

C.

TCP/UDP port 1812

D.

TCP/UDP port 989

Buy Now
Questions 193

Which of the following types of fire comes under Class K fire?

Options:

A.

Cooking oil fire

B.

Electrical fire

C.

Wooden fire

D.

Combustible metal fire

Buy Now
Questions 194

Which of the following is the default port for DNS zone transfer?

Options:

A.

Port 21

B.

Port 80

C.

Port 23

D.

Port 53

Buy Now
Questions 195

Which of the following entities are directly involved in Secure Electronic Transaction (SET)?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Merchant

B.

Credit card issuer

C.

Payment gateway

D.

Credit card holder

Buy Now
Questions 196

Which of the following is referred to as Radio Frequency Interference (RFI) and Electromagnetic Interference (EMI)?

Options:

A.

Spike

B.

Brownout

C.

Electrical line noise

D.

Transient

Buy Now
Questions 197

Which of the following OSI model layers handles addressing and routing?

Options:

A.

Session

B.

Physical

C.

Network

D.

Application

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Dec 9, 2025
Questions: 659
$66  $164.99
$50  $124.99
$42  $104.99
buy now GISP