Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PDF GISP Study Guide

Page: 12 / 25
Total 659 questions

GIAC?Information Security Professional Questions and Answers

Question 45

Which of the following tools or services is used to find the entire IP address range used by an organization?

Options:

A.

TRACERT

B.

Ping Scanner

C.

PATHPING

D.

Share Scanner

Question 46

You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. An employee of the company is dismissed for attempting to access secret data on the network. What measure will you take next to make the network secure?

Options:

A.

Change the password of the employee's user account.

B.

Disable the employee's user account.

C.

Remove the password of the employee's user account.

D.

Disconnect the employee's computer from the network.

Question 47

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

The NTFS file system should be implemented on a client computer.

C.

Strong encryption software should be used to store credit card information.

D.

Limited and authorized access should be allowed on the stored credit card information.

Question 48

Which of the following protocols work at the Session layer of the OSI model?

Options:

A.

User Datagram Protocol (UDP)

B.

Trivial File Transfer Protocol (TFTP)

C.

Border Gateway Multicast Protocol (BGMP)

D.

Internet Security Association and Key Management Protocol (ISAKMP)

Page: 12 / 25
Total 659 questions