100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SANS GISCP and GIAC questions with answers

Rating
-
Sold
-
Pages
101
Grade
A+
Uploaded on
07-06-2025
Written in
2024/2025

SANS GISCP and GIAC questions with answers

Institution
SANS GICSP
Course
SANS GICSP











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SANS GICSP
Course
SANS GICSP

Document information

Uploaded on
June 7, 2025
Number of pages
101
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SANS GISCP and GIAC questions with |\ |\ |\ |\ |\ |\




answers


Ack Piggybacking - CORRECT ANSWERS ✔✔The Practice of sending an ACK
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\




inside another packet going to the same destination
|\ |\ |\ |\ |\ |\ |\ |\




Address resolution protocol - CORRECT ANSWERS ✔✔Protocol for mapping
|\ |\ |\ |\ |\ |\ |\ |\ |\




an IP address to a physical machine address that is recognized on the local
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




network. |\




A table, usually called the ARP cache, is used to maintain a correlation
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




between each MAC and its corresponding IP address
|\ |\ |\ |\ |\ |\ |\




What are the five threat vectors? - CORRECT ANSWERS ✔✔Outside attack
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




from network |\




Outsider attack from telephone |\ |\ |\




Insider attack from local network |\ |\ |\ |\




insider attack from local system |\ |\ |\ |\




attack from malicious code |\ |\ |\




What are some external threat concerns? - CORRECT ANSWERS ✔✔-
|\ |\ |\ |\ |\ |\ |\ |\ |\




Malicious code might execute destructive overwrite to hard disks
|\ |\ |\ |\ |\ |\ |\ |\




-Malicious mas mailing code might expose sensitive information to the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\




internet

,- web server compromise might expose organization to ridicule
|\ |\ |\ |\ |\ |\ |\ |\




- Web server compromise might expose customer private data
|\ |\ |\ |\ |\ |\ |\ |\




What are some ways to bypass firewall protections? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




✔✔- Worms and Wireless
|\ |\ |\




- modems
|\




- tunnel anything through HTTP
|\ |\ |\ |\




- social engineering
|\ |\




What is social engineering? - CORRECT ANSWERS ✔✔- attempt to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\




manipulate or trick a person into providing information or access
|\ |\ |\ |\ |\ |\ |\ |\ |\




- bypass network security by exploiting humans
|\ |\ |\ |\ |\ |\




- vector is often outside attack by telephone or visitor inside
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\




What is Hping? - CORRECT ANSWERS ✔✔- a TCP version of ping
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




- sends custom TCP packets to a host and listens for replies
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




- enables port scanning and spoofing simultaneously
|\ |\ |\ |\ |\ |\




What is a group? - CORRECT ANSWERS ✔✔A group means multiple
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




iterations won't matter. If you encrypt with a key, then re-encrypt, it's the same
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




as using one key.
|\ |\ |\ |\




What is a port scan? - CORRECT ANSWERS ✔✔- common backdoor to open
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




a port|\

,- port scan scans for open ports on remote host
|\ |\ |\ |\ |\ |\ |\ |\ |\




- scans 0 - 65,535 twice. TCP and UDP
|\ |\ |\ |\ |\ |\ |\ |\




What is nmap? - CORRECT ANSWERS ✔✔Network scanner.
|\ |\ |\ |\ |\ |\ |\




What are nmap scanning techniques? - CORRECT ANSWERS ✔✔- Full open
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\




- half open (stealth scan)
|\ |\ |\ |\




- UDP
|\




- Ping
|\




What is network stumbler? - CORRECT ANSWERS ✔✔- free windows based
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




wireless scanner for 802.1b
|\ |\ |\




- detects access point settings
|\ |\ |\ |\




- supports GSP integration
|\ |\ |\




- identifies networks as encrypted or unencrypted
|\ |\ |\ |\ |\ |\




What is Kismet? - CORRECT ANSWERS ✔✔- Free linux WLAN analysis tool
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




- completely passive, cannot be detected
|\ |\ |\ |\ |\




- supports advanced GPS integration and mapping features
|\ |\ |\ |\ |\ |\ |\




- used for wardriving, WLAN vulerability assessment
|\ |\ |\ |\ |\ |\




What is Wardriving? - CORRECT ANSWERS ✔✔Going around with
|\ |\ |\ |\ |\ |\ |\ |\ |\




equipment to detect wireless networks |\ |\ |\ |\

, What is War Dialing? - CORRECT ANSWERS ✔✔- trying to ID modems in a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




telephone exchange that may be susceptible to compromise
|\ |\ |\ |\ |\ |\ |\




What are some Pen Test techniques? - CORRECT ANSWERS ✔✔- War dialing
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




- war driving
|\ |\




- Sniffing
|\




- eavesdropping
|\




- dumpster diving
|\ |\




- social engineering
|\ |\




What is IDS? - CORRECT ANSWERS ✔✔- intrusion detection system
|\ |\ |\ |\ |\ |\ |\ |\ |\




- it reports attacks against monitored systems/networks
|\ |\ |\ |\ |\ |\




What is IDS not? - CORRECT ANSWERS ✔✔- not a replacement for firewalls,
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




hardening, strong policies, or other DiD methods
|\ |\ |\ |\ |\ |\ |\




- low maintenance
|\ |\




- inexpensive
|\




What are the four types of events reported by IDS? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




✔✔- true positive
|\ |\




- false positive
|\ |\




- true negative
|\ |\




- false negative
|\ |\

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EXAMSTUDYPLUG Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
301
Member since
3 year
Number of followers
107
Documents
17722
Last sold
1 day ago
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Read more Read less
4.5

230 reviews

5
155
4
50
3
13
2
5
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions