Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GISP VCE Exam Download

Page: 8 / 25
Total 659 questions

GIAC?Information Security Professional Questions and Answers

Question 29

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Options:

A.

Tunneling

B.

Spoofing

C.

Packet filtering

D.

Packet sniffing

Question 30

Which of the following encryption algorithms are based on stream ciphers?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Twofish

B.

RC4

C.

FISH

D.

Blowfish

Question 31

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _____ layer of the OSI model.

Options:

A.

transport

Question 32

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For monitoring unauthorized zone transfer

B.

For preventing malware attacks on a DNS server

C.

For recording the number of queries resolved

D.

For measuring a DNS server's performance

Page: 8 / 25
Total 659 questions