Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GIAC Certification GISP Book

Page: 25 / 25
Total 659 questions

GIAC?Information Security Professional Questions and Answers

Question 97

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

Options:

A.

Piggybacking

B.

Hacking

C.

Session hijacking

D.

Keystroke logging

Question 98

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

False positive

B.

False negative

C.

True negative

D.

True positive

Page: 25 / 25
Total 659 questions