Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GIAC Certification GISP GIAC Study Notes

Page: 20 / 25
Total 659 questions

GIAC?Information Security Professional Questions and Answers

Question 77

Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

Options:

A.

Authentication

B.

Sanitization

C.

Hardening

D.

Cryptography

Question 78

Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?

Options:

A.

Single Loss Expectancy x Annualized Rate of Occurrence

B.

ALE before implementing safeguard + ALE after implementing safeguard + annual cost of safeguard

C.

ALE before implementing safeguard - ALE after implementing safeguard - annual cost of safeguar

D.

Asset Value x Exposure factor

Question 79

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Protocol detection

B.

Statistical anomaly detection

C.

Pattern matching detection

D.

Knowledge-based detection

Question 80

Which of the following rate systems of Orange book has mandatory protection of the Trusted Computing Base (TCB)?

Options:

A.

B-rated system

B.

A-rated system

C.

D-rated system

D.

C-Rated system

Page: 20 / 25
Total 659 questions