[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GISP Dumps with VCE and PDF 171-180

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GISP.html

GIAC Information Security Professional

Question No: 171 – (Topic 2)

Which of the following processes is known as Declassification?

  1. Verifying the identity of a person, network host, or system process.

  2. Physically destroying the media and the information stored on it.

  3. Assessing the risk involved in making a confidential document available to public.

  4. Removing the content from the media so that it is difficult to restore.

Answer: C

Question No: 172 – (Topic 2)

Which of the following components come under the physical layer of the OSI model? Each correct answer represents a complete solution. Choose all that apply.

  1. Wall jacks

  2. Hubs

  3. Switches

  4. Fiber cabling

  5. RJ-45 connectors

Answer: A,B,D,E

Question No: 173 – (Topic 2)

Which of the following is ensured by the concept of availability in information system security?

  1. Data modifications are not made by an unauthorized user or process.

  2. The intentional or unintentional unauthorized disclosure of a message or important document contents is prevented.

  3. The systems are up and running when they are needed.

  4. Unauthorized modifications are not made by authorized users.

Answer: C

Question No: 174 – (Topic 2)

Which of the following is an authentication protocol?

  1. LDAP

  2. PPTP

  3. TLS

  4. Kerberos

Answer: D

Question No: 175 – (Topic 2)

Which of the following security models dictates that subjects can only access objects through applications?

  1. Biba-Clark model

  2. Bell-LaPadula

  3. Biba model

  4. Clark-Wilson

Answer: D

Question No: 176 – (Topic 2)

Which of the following protocols work at the Application layer of an OSI model? Each correct answer represents a complete solution. Choose three.

  1. Secure Hypertext Transfer Protocol (S-HTTP)

  2. Address Resolution Protocol (ARP)

  3. Post Office Protocol version 3 (POP3)

  4. Trivial File Transfer Protocol (TFTP)

Answer: A,C,D

Question No: 177 – (Topic 2)

Which of the following statements about system hardening are true? Each correct answer represents a complete solution. Choose two.

  1. It is used for securing the computer hardware.

  2. It can be achieved by locking the computer room.

  3. It is used for securing an operating system.

  4. It can be achieved by installing service packs and security updates on a regular basis.

Answer: C,D

Question No: 178 – (Topic 2)

Which of the following are considered Bluetooth security violations? Each correct answer represents a complete solution. Choose two.

  1. Social engineering

  2. Bluesnarfing

  3. SQL injection attack

  4. Bluebug attack

  5. Cross site scripting attack

Answer: B,D

Question No: 179 – (Topic 2)

Which of the following are intrusion detection device?

  1. Fingerprint reader

  2. Smart card reader

  3. Retinal scanner

  4. CCTV

Answer: D

Question No: 180 – (Topic 2)

Which of the following statements about biometric authentication is true?

  1. A user provides his user name and password for authentication.

  2. A user uses a smart card for authentication.

  3. A sensor scans some physical characteristics of a user and sends that information to the authentication server.

  4. A user is issued a device that is used for authentication.

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GISP Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GISP Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.