Exam Details

  • Exam Code
    :GISP
  • Exam Name
    :GIAC Information Security Professional
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :659 Q&As
  • Last Updated
    :May 09, 2024

GIAC GIAC Information Security GISP Questions & Answers

  • Question 21:

    Which of the following protocols is used with a tunneling protocol to provide security?

    A. EAP

    B. IPSec

    C. FTP

    D. IPX/SPX

  • Question 22:

    Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

    A. Snooping

    B. Phishing

    C. SYN attack

    D. Spoofing

  • Question 23:

    Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.

    A. Blackbox testing

    B. Port redirection

    C. Firewalking

    D. Brainstorming

  • Question 24:

    On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?

    A. Session layer

    B. Transport layer

    C. Application layer

    D. Data-link layer

  • Question 25:

    In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

    A. ARP spoofing

    B. Replay

    C. Brute force

    D. MAC duplicating

  • Question 26:

    Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

    A. Spoofing

    B. System hardening

    C. Shielding

    D. Auditing

  • Question 27:

    An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

    A. Biometrics

    B. Anonymous

    C. Mutual

    D. Multi-factor

  • Question 28:

    Which of the following tools can be used by a user to hide his identity? Each correct answer represents a complete solution. Choose all that apply.

    A. War dialer

    B. IPchains

    C. Anonymizer

    D. Proxy server

    E. Rootkit

  • Question 29:

    Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

    A. Corroborating

    B. Circumstantial

    C. Direct

    D. Incontrovertible

  • Question 30:

    Which of the following are the phases of the Certification and Accreditation (CandA) process? Each correct answer represents a complete solution. Choose two.

    A. Auditing

    B. Initiation

    C. Detection

    D. Continuous Monitoring

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GISP exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.