Exam Details

  • Exam Code
    :GISP
  • Exam Name
    :GIAC Information Security Professional
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :659 Q&As
  • Last Updated
    :May 09, 2024

GIAC GIAC Information Security GISP Questions & Answers

  • Question 31:

    Which of the following is the method of hiding data within another media type such as graphic or document?

    A. Spoofing

    B. Cryptanalysis

    C. Steganography

    D. Packet sniffing

  • Question 32:

    Which of the following is a program that monitors data packets traveling across a network?

    A. Sniffer

    B. Smurf

    C. Hacker

    D. BitLocker

  • Question 33:

    At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

    A. The Physical layer

    B. The Network layer

    C. The Data-Link layer

    D. The Presentation layer

  • Question 34:

    Which of the following services are provided by Remote Authentication Dial-In User Service (RADIUS)? Each correct answer represents a complete solution. Choose three.

    A. Authentication

    B. Data encryption

    C. Authorization

    D. Accounting

  • Question 35:

    Which of the following is a process of monitoring data packets that travel across a network?

    A. Packet sniffing

    B. Packet filtering

    C. Shielding

    D. Password guessing

  • Question 36:

    Which of the following statements about Network Address Translation (NAT) is true?

    A. It hides the public network from internal hosts.

    B. It hides internal hosts from the public network.

    C. It uses public IP addresses on an internal network.

    D. It translates IP addresses into user friendly names.

  • Question 37:

    Which of the following protocols provides maintenance and error reporting function?

    A. ICMP

    B. IGMP

    C. PPP

    D. UDP

  • Question 38:

    Which of the following types of fire comes under Class K fire?

    A. Cooking oil fire

    B. Electrical fire

    C. Wooden fire

    D. Combustible metal fire

  • Question 39:

    Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

    A. Cryptanalysis

    B. Kerberos

    C. Cryptographer

    D. Cryptography

  • Question 40:

    Which of the following is used by the Diffie-Hellman encryption algorithm?

    A. Password

    B. Access control entry

    C. Key exchange

    D. Access control list

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GISP exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.