[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GISP Dumps with VCE and PDF 251-260

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!

GIAC Information Security Professional

Question No: 251 – (Topic 2)

You work as a Network Administrator for NetTech Inc. The company#39;s network is connected to the Internet.

For security, you want to restrict unauthorized access to the network with minimum administrative effort.

You want to implement a hardware-based solution. What will you do to accomplish this?

  1. Connect a brouter to the network.

  2. Implement firewall on the network.

  3. Connect a router to the network.

  4. Implement a proxy server on the network.

Answer: B

Question No: 252 – (Topic 2)

Which of the following conditions the line to keep voltage steady and clean?

  1. Power regulator

  2. Demilitarized zone (DMZ)

  3. Transponder

  4. Smoke detector

Answer: A

Question No: 253 – (Topic 2)

Which of the following refers to a condition in which a computer repeatedly sends ICMP echo requests to another host?

  1. Broadcast storm

  2. SYN attack

  3. Spoofing

  4. PING attack

Answer: D

Question No: 254 – (Topic 2)

A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to perform war dialing?

Each correct answer represents a complete solution. Choose all that apply.

  1. ToneLoc

  2. THC-Scan

  3. Wingate

  4. NetStumbler

Answer: A,B

Question No: 255 – (Topic 2)

Which of the following classes of fire comes under Class C fire?

  1. Combustible metals fire

  2. Paper or wood fire

  3. Oil fire

  4. Electronic or computer fire

Answer: D

Question No: 256 – (Topic 2)

Which of the following is used as a transmission media by the fiber-optic cables?

  1. Light

  2. Infrared

  3. Electrical current

  4. Radio wave

Answer: A

Question No: 257 – (Topic 2)

On which of the following OSI model layers does IPSec operate?

  1. Data-link layer

  2. Physical layer

  3. Session layer

  4. Network layer

Answer: D

Question No: 258 – (Topic 2)

Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

  1. Integrity

  2. Privacy

  3. Confidentiality

  4. Availability

Answer: A,C,D

Question No: 259 – (Topic 2)

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we- are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

A. nc 23

B. nc -v -n 80

C. nmap -v -O

D. nmap -v -O www.we-are-secure.com

Answer: C,D

Question No: 260 – (Topic 2)

Which of the following protocols implements VPN using IPSec?

  1. PPP

  2. L2TP

  3. PPTP

  4. SLIP

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GISP Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GISP Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.