Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GISP Questions Bank

Page: 11 / 25
Total 659 questions

GIAC?Information Security Professional Questions and Answers

Question 41

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

Options:

A.

Wiretapping

B.

Spoofing

C.

Data diddling

D.

Eavesdropping

Question 42

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Options:

A.

Authentication

B.

Non-repudiation

C.

Confidentiality

D.

Integrity

Question 43

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It backs up the entire database, including the transaction log.

B.

It is the fastest method of backing up data.

C.

It backs up only the files changed since the most recent backup and clears the archive bit.

D.

It is the slowest method for taking a data backup.

Question 44

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against

__________.

Options:

A.

SNMP enumeration

B.

DNS zone transfer

C.

IIS buffer overflow

D.

NetBIOS NULL session

Page: 11 / 25
Total 659 questions