Exam Details

  • Exam Code
    :GISP
  • Exam Name
    :GIAC Information Security Professional
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :659 Q&As
  • Last Updated
    :Apr 28, 2024

GIAC GIAC Information Security GISP Questions & Answers

  • Question 1:

    Identify whether the given statement is true or false.

    "Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

    A. False

    B. True

  • Question 2:

    You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?

    A. The site's Web server has heavy traffic.

    B. WINS server has no NetBIOS name entry for the server.

    C. DNS entry is not available for the host name.

    D. The site's Web server is offline.

  • Question 3:

    Which of the following is a technique used to attack an Ethernet wired or wireless network?

    A. DNS poisoning

    B. Keystroke logging

    C. Mail bombing

    D. ARP poisoning

  • Question 4:

    Which of the following law does not protect intellectual property?

    A. Murphy's law

    B. Patent law

    C. Trademark

    D. Copyright

  • Question 5:

    The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from children under __ years of age without verifiable permission of a parent?

    A. 15

    B. 13

    C. 10

    D. 21

    E. 18

  • Question 6:

    Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

    A. Rootkit

    B. Backdoor

    C. Access control list

    D. Rainbow table

  • Question 7:

    Which of the following are the major tasks of risk management? Each correct answer represents a complete solution. Choose two.

    A. Building Risk free systems

    B. Risk control

    C. Risk identification

    D. Assuring the integrity of organizational data

  • Question 8:

    Which of the following protocols implements VPN using IPSec?

    A. L2TP

    B. SLIP

    C. PPP

    D. PPTP

  • Question 9:

    Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

    A. Visitors

    B. Customers

    C. Employees

    D. Hackers

  • Question 10:

    Which of the following should propose applicable and effective security controls for managing the risks?

    A. Risk assessment

    B. Risk treatment plan

    C. Risk communication

    D. Risk management plan

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GISP exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.