Free GISF Exam Dumps

Question 21

- (Topic 2)
Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?

Correct Answer:D

Question 22

- (Topic 1)
Which of the following is a remote access protocol that supports encryption?

Correct Answer:A

Question 23

- (Topic 2)
Which of the following IDS/IPS detection methods do the URLs use to detect and prevent an attack?

Correct Answer:C

Question 24

CORRECT TEXT - (Topic 1)
Fill in the blank with the appropriate layer name.
The Network layer of the OSI model corresponds to the ______ layer of the TCP/IP model.
Solution:
Internet

Does this meet the goal?

Correct Answer:A

Question 25

- (Topic 3)
The IT Director of the company is very concerned about the security of the network. Which audit policy should he implement to detect possible intrusions into the network? (Click the Exhibit button on the toolbar to see the case study.)

Correct Answer:C