[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GISP Dumps with VCE and PDF 231-240

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!

GIAC Information Security Professional

Question No: 231 – (Topic 2)

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

  1. Cryptanalysis

  2. Kerberos

  3. Cryptographer

  4. Cryptography

Answer: A

Question No: 232 – (Topic 2)

Which of the following is used by the Diffie-Hellman encryption algorithm?

  1. Password

  2. Access control entry

  3. Key exchange

  4. Access control list

Answer: C

Question No: 233 – (Topic 2)

Which of the following provides secure online payment services?

  1. CA

  2. IEEE

  3. ACH

  4. ICSA

Answer: C

Question No: 234 – (Topic 2)

John works as an Ethical Hacker for PassGuide Inc. He wants to find out the ports that are open in PassGuide#39;s server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?

  1. TCP SYN


  3. TCP FIN

  4. Xmas tree

Answer: A

Question No: 235 – (Topic 2)

Which of the following statements about the Instant messaging programs are true? Each correct answer represents a complete solution. Choose all that apply.

  1. Most of the programs have no encryption facility.

  2. They allow effective and efficient communication and immediate receipt of reply.

  3. They provide secure password management.

  4. They can bypass corporate firewalls.

Answer: A,B,D

Question No: 236 – (Topic 2)

Which of the following tools is used to flood the local network with random MAC addresses?

  1. NETSH

  2. NMAP

  3. Port scanner

  4. Macof

Answer: D

Question No: 237 – (Topic 2)

Mark works as a Webmaster for Infonet Inc. He sets up an e-commerce site. He wants to accept online payments through credit cards on this site. He wants the credit card numbers to be encrypted. What will Mark do to accomplish the task?

  1. Use PGP.

  2. Use HTTP.

  3. Use MIME.

  4. Use SET.

Answer: D

Question No: 238 – (Topic 2)

Which of the following layers protocols handles file transfer and network management?

  1. Application

  2. Transport

  3. Presentation

  4. Session

Answer: A

Question No: 239 – (Topic 2)

Fill in the blank with the appropriate value.

Twofish symmetric key block cipher operates on 128-bits block size using key sizes up to bits.

A. 256

Answer: A

Question No: 240 – (Topic 2)

Which of the following protects from electrical and magnetic induction that causes interference to the power voltage?

  1. Power regulator

  2. Shielded line

  3. Firewall

  4. Smoke detector

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GISP Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GISP Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.