Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GISP Exam Questions Tutorials

Page: 17 / 25
Total 659 questions

GIAC?Information Security Professional Questions and Answers

Question 65

A ________ is a detailed step-by-step document that explains exactly what is to be done.

Options:

A.

Procedure

B.

Baseline

C.

Standard

D.

Rule

Question 66

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For monitoring unauthorized zone transfer

B.

For preventing malware attacks on a DNS server

C.

For recording the number of queries resolved

D.

For measuring a DNS server's performance

Question 67

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.

Options:

A.

Blackbox testing

B.

Port redirection

C.

Firewalking

D.

Brainstorming

Question 68

On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?

Options:

A.

Session layer

B.

Transport layer

C.

Application layer

D.

Data-link layer

Page: 17 / 25
Total 659 questions