Limited Time Discount Offer
30% Off - Ends in 02:00:00

X

GIAC GISP Dumps

verified by experts

  • Verified by experts

GISP Premium File

  • 654 Questions & Answers

$21.41

$14.99
GIAC
GIAC Information Security Professional
GIAC
GIAC Information Security Professional

Files

File Name
Views
Size
Downloads

5

425.9 KB

0

Files

Views

5

Size

425.9 KB

Downloads

0

Questions & Answers for GIAC GISP

Showing 1-15 of 659 Questions

Question #1 - Topic 1

Which of the following can be prevented by an organization using job rotation and
separation of duties policies?

A. Collusion

B. Eavesdropping

C. Buffer overflow

D. Phishing

Question #2 - Topic 1

security system
are true?
Each correct answer represents a complete solution. Choose two.

A. It requires a password only once to authenticate users.

B. It requires a new password every time a user authenticates himself.

C. It generates passwords by using either the MD4 or MD5 hashing algorithm.

D. It generates passwords by using Kerberos v5.

Question #3 - Topic 1

Which of the following standards is used in wireless local area networks (WLANs)?

A. IEEE 802.4

B. IEEE 802.11b

C. IEEE 802.5

D. IEEE 802.3

Question #4 - Topic 1

Which of the following types of attack can be used to break the best physical and logical
security mechanism to gain access to a system?

A. Social engineering attack

B. Password guessing attack

C. Mail bombing

D. Cross site scripting attack

Question #5 - Topic 1

Which of the following are ensured by the concept of integrity in information system
security?
Each correct answer represents a complete solution. Choose two.

A. Unauthorized modifications are not made by authorized users.

B. Data modifications are not made by an unauthorized user or process.

C. The intentional or unintentional unauthorized disclosure of a message or important document contents is prevented.

D. The systems are up and running when they are needed.

Question #6 - Topic 1

is true?

A. DMZ is a corporate network used as the Internet.

B. DMZ is a firewall that lies in between two corporate networks.

C. DMZ is a network that is not connected to the Internet.

D. DMZ is a network that lies in between a corporate network and the Internet.

Question #7 - Topic 1

Each correct answer represents a complete solution. Choose all that apply.

A. ASCII

B. MPEG

C. TIFF

D. JPEG

Question #8 - Topic 1

Which methods help you to recover your data in the event of a system or hard disk failure?
Each correct answer represents a complete solution. Choose two.

A. Install a RAID system

B. Use data encryption

C. Install and use a tape backup unit

D. Install UPS systems on all important devices

Question #9 - Topic 1

These are false reports about non-existent viruses. In these reports, the writer often claims
to do impossible things. Due to these false reports, the network administrator shuts down
his network, which in turn affects the work of the company. These reports falsely claim to
describe an extremely dangerous virus, and declare that the report is issued by a reputed
company. These reports are known as __________.

A. Time bombs

B. Virus hoaxes

C. Chain letters

D. Spambots

E. Logic bombs

Question #10 - Topic 1

stand for?

A. Rivest-Shamir-Adleman

B. Read System Authority

C. Rivest-System-Adleman

D. Remote System Authority

Question #11 - Topic 1

Fill in the blank with the appropriate value.
Primary Rate Interface (PRI) of an ISDN connection contains _______ B channels and
______ D channel.

A. 23,1

Question #12 - Topic 1

Which of the following refers to going through someone's trash to find out useful or
confidential information?

A. Dumpster diving

B. Hacking

C. Phishing

D. Spoofing

Question #13 - Topic 1

Which of the following heights of fence deters only casual trespassers?

A. 3 to 4 feet

B. 2 to 2.5 feet

C. 8 feet

D. 6 to 7 feet

Question #14 - Topic 1

John works as a professional Ethical Hacker. He has been assigned a project to test the
security of www.we-are-secure.com. He recommends a disk encryption tool to encrypt the
secret files of the We-are-secure server. He presents a report to the We-are-secure
authorities as given below:
Which of the following tools is John recommending for disk encryption on the We-are-
secure server?

A. CryptoHeaven

B. Stunnel

C. TrueCrypt

D. Magic Lantern

Question #15 - Topic 1

Fill in the blank with the appropriate term.
A ___________ is a digital representation of information that identifies authorized users on
the Internet and intranets.

A. certificate

×