[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GISP Dumps with VCE and PDF 141-150

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GISP.html

GIAC Information Security Professional

Question No: 141 – (Topic 1)

Which of the following is an entry in an object#39;s discretionary access control list (DACL) that grants permissions to a user or group?

  1. Access control list (ACL)

  2. Discretionary access control entry (DACE)

  3. Security Identifier (SID)

  4. Access control entry (ACE)

Answer: D

Question No: 142 – (Topic 1)

Which of the following database types is a collection of tables that are linked by their primary keys?

  1. Relational database management system

  2. Object-oriented database management system

  3. Hierarchical database management system

  4. File-oriented database management system

Answer: A

Question No: 143 – (Topic 1)

You work as a Network Administrator for NetTech Inc. The company#39;s network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?

  1. Disable DNS recursive queries on the DNS server.

  2. Enable DNS recursive queries on the DNS server.

  3. Enable DNS reverse lookup on the e-mail server.

  4. Disable DNS reverse lookup on the e-mail server.

Answer: C

Question No: 144 – (Topic 1)

Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?

  1. Sam Spade

  2. NIDS

  3. ACL

  4. Cookies

Answer: C

Question No: 145 – (Topic 1)

Which of the following standards works at the presentation layer?

Each correct answer represents a complete solution. Choose all that apply.

  1. ASCII

  2. MPEG

  3. TIFF

  4. JPEG

Answer: A,B,C,D

Question No: 146 – (Topic 1)

Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose two.

  1. It allows the computers in a private network to share a global, ISP assigned address to connect to the Internet.

  2. It reduces the need for globally unique IP addresses.

  3. It allows external network clients access to internal services.

  4. It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

Answer: A,B

Question No: 147 – (Topic 1)

Which of the following types of halon is found in portable extinguishers and is stored as a liquid?

  1. Halon 11

  2. Halon 1301

  3. Halon 1211

  4. Halon-f

Answer: C

Question No: 148 – (Topic 1)

You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS). You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish this?

  1. Copy the files to a network share on a FAT32 volume.

  2. Copy the files to a network share on an NTFS volume.

  3. Place the files in an encrypted folder. Then, copy the folder to a floppy disk.

  4. Copy the files to a floppy disk that has been formatted using Windows 2000 Professional.

Answer: B

Question No: 149 – (Topic 1)

You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this?

Each correct answer represents a complete solution. Choose two.

  1. Rename the Administrator account.

  2. Remove the Administrator account.

  3. Disable the Guest account.

  4. Enable the Guest account.

Answer: A,C

Topic 2, Volume B

Question No: 150 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the TFN and Trin00 tools to test the security of the We-aresecure server, so that he can check whether the server is vulnerable or not. Using these tools, which of the following attacks can John perform to test the security of the We-are-secure server?

  1. Reply attack

  2. Cross site scripting attack

  3. DDoS attack

  4. Brute force attack

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GISP Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GISP Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.