Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GISP Exam Results

Page: 7 / 25
Total 659 questions

GIAC?Information Security Professional Questions and Answers

Question 25

Which of the following tools was developed by the FBI and is used for keystroke logging in order to capture encryption keys and other information useful for deciphering transmissions?

Options:

A.

Alchemy Remote Executor

B.

Stealth Voice Recorder

C.

KeyGhost USB keylogger

D.

KeyGhost keylogger

E.

Magic Lantern

Question 26

Which of the following hashing algorithms produces a variable length hash value?

Options:

A.

MD5

B.

SHA

C.

HAVAL

D.

MD4

Question 27

Which of the following access control models requires centralize database of user accounts?

Options:

A.

User based

B.

Data based

C.

Group based

D.

Partitions based

Question 28

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

He should upgrade his antivirus program.

B.

He should restore his Windows settings.

C.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

Page: 7 / 25
Total 659 questions