Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Passed Exam Today GISP

Page: 2 / 25
Total 659 questions

GIAC?Information Security Professional Questions and Answers

Question 5

What is the hash value length of the Secure Hash Algorithm (SHA-1)?

Options:

A.

164-bit

B.

320-bit

C.

128-bit

D.

160-bit

Question 6

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?

Options:

A.

Microsoft Point-to-Point Encryption (MPPE)

B.

Pretty Good Privacy (PGP)

C.

Data Encryption Standard (DES)

D.

IP Security (IPSec)

Question 7

Which of the following performs packet screening for security on the basis of port numbers?

Options:

A.

Switch

B.

DNS

C.

Hub

D.

Firewall

Question 8

Which of the following is used by the Diffie-Hellman encryption algorithm?

Options:

A.

Password

B.

Access control entry

C.

Key exchange

D.

Access control list

Page: 2 / 25
Total 659 questions