[Free] 2017(Sep) EnsurePass Braindumps GIAC GISP Dumps with VCE and PDF 431-440

EnsurePass
2017 Sep GIAC Official New Released GISP
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GISP.html

GIAC Information Security Professional

Question No: 431 – (Topic 3)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

  1. PsList

  2. Cain

  3. Fpipe

  4. PsExec

Answer: C

Question No: 432 – (Topic 3)

Fill in the blanks with the appropriate values.

Blowfish is a -bit block cipher that can support key lengths of up to bits.

A. 64,448

Answer: A

Question No: 433 – (Topic 3)

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

  1. Technical

  2. Administrative

  3. Automatic

  4. Physical

Answer: A,B,D

Question No: 434 – (Topic 3)

Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?

  1. 64-bit

  2. 16-bit

  3. 32-bit

  4. 128-bit

Answer: D

Question No: 435 – (Topic 3)

Which of the following refers to the emulation of the identity of a network computer by an attacking computer?

  1. Hacking

  2. PING attack

  3. Spoofing

  4. SYN attack

Answer: C

Question No: 436 – (Topic 3)

Which of the following are the examples of technical controls? Each correct answer represents a complete solution. Choose three.

  1. Auditing

  2. System access

  3. Data backups

  4. Network acchitecture

Answer: A,B,D

Question No: 437 – (Topic 3)

Which of the following layers are the sub layers of the data-link layer? Each correct answer represents a complete solution. Choose all that apply.

  1. Media Access Control (MAC)

  2. Logical Link Control (LLC)

  3. Reserve Address Resolution Protocol (RARP)

  4. Serial Line Internet Protocol (SLIP)

Answer: A,B

Question No: 438 – (Topic 3)

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

  1. S/MIME

  2. PGP

  3. Symmetric

  4. Asymmetric

Answer: C

Question No: 439 – (Topic 3)

Which of the following allows an attacker to enter malicious data into a Website?

  1. Cross site scripting

  2. Inline scripting

  3. Windows PowerShell scripting

  4. Client-side scripting

Answer: A

Question No: 440 – (Topic 3)

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network.

You have configured a firewall on the network. A filter has been applied to block all the ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open?

Each correct answer represents a complete solution. Choose two.

  1. 20

  2. 80

C. 110

D. 25

Answer: C,D

100% Free Download!
Download Free Demo:GISP Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GISP Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE