Exam Details

  • Exam Code
    :GISP
  • Exam Name
    :GIAC Information Security Professional
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :659 Q&As
  • Last Updated
    :May 09, 2024

GIAC GIAC Information Security GISP Questions & Answers

  • Question 11:

    Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?

    A. DNS server

    B. Firewall

    C. Proxy server

    D. WINS server

  • Question 12:

    A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.

    A. Man-in-the-middle

    B. Brute force

    C. Denial of Service (DoS)

    D. Dictionary

  • Question 13:

    Which of the following statements about DES (Data Encryption Standard) is true?

    A. Its most widely used symmetric encryption algorithm uses a 56-bit key.

    B. Its most widely used symmetric encryption algorithm uses a 32-bit key.

    C. Its most widely used symmetric encryption algorithm uses a 128-bit key.

    D. Its most widely used symmetric encryption algorithm uses a 64-bit key.

  • Question 14:

    Which of the following is not a level of military data-classification system?

    A. Unclassified

    B. Normal

    C. Confidential

    D. Top secret

  • Question 15:

    Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?

    A. Single Loss Expectancy x Annualized Rate of Occurrence

    B. ALE before implementing safeguard + ALE after implementing safeguard + annual cost of safeguard

    C. ALE before implementing safeguard - ALE after implementing safeguard - annual cost of safeguar

    D. Asset Value x Exposure factor

  • Question 16:

    Which of the following are examples of passive attacks? Each correct answer represents a complete solution. Choose all that apply.

    A. Shoulder surfing

    B. Dumpster diving

    C. Placing a backdoor

    D. Eavesdropping

  • Question 17:

    Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.

    A. Data service

    B. Account service

    C. Authentication service

    D. Ticket-granting service

  • Question 18:

    Which of the following is a reason to implement security logging on a DNS server?

    A. For monitoring unauthorized zone transfer

    B. For preventing malware attacks on a DNS server

    C. For recording the number of queries resolved

    D. For measuring a DNS server's performance

  • Question 19:

    Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.

    A. Technical

    B. Administrative

    C. Automatic

    D. Physical

  • Question 20:

    Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?

    A. 64-bit

    B. 16-bit

    C. 32-bit

    D. 128-bit

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GISP exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.