[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GISP Dumps with VCE and PDF 131-140

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!

GIAC Information Security Professional

Question No: 131 – (Topic 1)

Which of the following terms is used for securing an operating system from an attack?

  1. System hacking

  2. System hardening

  3. System mirroring

  4. System indexing

Answer: B

Question No: 132 – (Topic 1)

Which of the following access control models uses a role based method to determine access rights and permission?

  1. Discretionary access control

  2. Roaming access control

  3. Nondiscretionary access control

  4. Mandatory access control

Answer: C

Question No: 133 – (Topic 1)

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

  1. UDP port 1701

  2. UDP port 161

  3. TCP port 443

  4. TCP port 110

Answer: A

Question No: 134 – (Topic 1)

Which of the following is a process of monitoring data packets that travel across a network?

  1. Packet sniffing

  2. Authentication

  3. Network binding

  4. Encryption

Answer: A

Question No: 135 – (Topic 1)

Which of the following statements about service pack are true? Each correct answer represents a complete solution. Choose two.

  1. It is a medium by which product updates are distributed.

  2. It is a term used for securing an operating system.

  3. It is a term generally related to security problems in a software.

  4. It is a collection of Fixes and Patches in a single product.

Answer: A,D

Question No: 136 – (Topic 1)

Fill in the blank with the appropriate value.

Primary Rate Interface (PRI) of an ISDN connection contains B channels and

D channel.

A. 23,1

Answer: A

Question No: 137 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He writes the following snort rule:

This rule can help him protect the We-are-secure server from the .

  1. Chernobyl virus

  2. I LOVE YOU virus

  3. Melissa virus

  4. Nimda virus

Answer: D

Question No: 138 – (Topic 1)

Which of the following rate systems of Orange book has mandatory protection of the Trusted Computing Base (TCB)?

  1. B-rated system

  2. A-rated system

  3. D-rated system

  4. C-Rated system

Answer: A

Question No: 139 – (Topic 1)

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

  1. B-rated

  2. A-rated

  3. D-rated

  4. C-rated

Answer: A

Question No: 140 – (Topic 1)

Which of the following standards is used in wireless local area networks (WLANs)?

  1. IEEE 802.4

  2. IEEE 802.11b

  3. IEEE 802.5

  4. IEEE 802.3

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GISP Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GISP Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.