[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GISP Dumps with VCE and PDF 421-430

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!

GIAC Information Security Professional

Question No: 421 – (Topic 3)

Which of the following statements regarding Secure Sockets Layer (SSL) are true? Each correct answer represents a complete solution. Choose all that apply.

  1. SSL provides message integrity to prevent alteration to the message.

  2. SSL can process credit cards.

  3. During SSL session, information is encrypted to prevent unauthorized disclosure.

  4. SSL can support 128-bit encryption.

Answer: A,C,D

Question No: 422 – (Topic 3)

Which of the following statements best explains how encryption works on the Internet?

  1. Encryption encodes information using specific algorithms with a string of numbers known as a key

  2. Encryption helps in transaction processing by e-commerce servers on the Internet.

  3. Encryption validates a username and password before sending information to the Web server.

  4. Encryption allows authorized users to access Web sites that offer online shopping.

Answer: A

Question No: 423 – (Topic 3)

Which of the following protocols provides functionalities for advanced management associated with the use of digital certificates such as certificate issuance, exchange, and revocation?

  1. Hypertext Transfer Protocol Secure (HTTPS)

  2. Certificate Management Protocol (CMP)

  3. Extensible Authentication Protocol-Transport Level Security (EAP-TLS)

  4. Certificate Enrollment Protocol (CEP)

Answer: B

Question No: 424 – (Topic 3)

Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.

  1. It backs up the entire database, including the transaction log.

  2. It is the fastest method of backing up data.

  3. It backs up only the files changed since the most recent backup and clears the archive bit.

  4. It is the slowest method for taking a data backup.

Answer: B,C

Question No: 425 – (Topic 3)

Which of the following types of firewalls looks deep into packets and makes granular access control decisions?

  1. Stateful

  2. Application level proxy

  3. Packet filtering

  4. Circuit level proxy

Answer: B

Question No: 426 – (Topic 3)

Which of the following is referred to as Radio Frequency Interference (RFI) and Electromagnetic Interference (EMI)?

  1. Spike

  2. Brownout

  3. Electrical line noise

  4. Transient

Answer: C

Question No: 427 – (Topic 3)

Which of the following protocols work at the Session layer of the OSI model?

  1. User Datagram Protocol (UDP)

  2. Trivial File Transfer Protocol (TFTP)

  3. Border Gateway Multicast Protocol (BGMP)

  4. Internet Security Association and Key Management Protocol (ISAKMP)

Answer: C,D

Question No: 428 – (Topic 3)

Which of the following safes are large enough to allow a person to enter?

  1. Wall safes

  2. Floor safes

  3. Vaults

  4. Chests

Answer: C

Question No: 429 – (Topic 3)

Which of the following protocols is responsible for requesting Web pages from a Web server and sending back the responses to the Web browser?

  1. IP

  2. FTP

  3. HTTP

  4. PPP

Answer: C

Question No: 430 – (Topic 3)

Which of the following provides protection from attacks at the application layer and prevents unauthorized access and packet spoofing?

  1. Proxy server

  2. IPSec protocol

  3. Network address translation (NAT)

  4. STP cabling

Answer: A

100% Ensurepass Free Download!
Download Free Demo:GISP Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GISP Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.