GIAC Information Security Professional (GISP) Exam Questions

Who would like to take GISP exam?

  • Security Professionals that want to fill the gaps in their understanding of technical information security
  • System, Security, and Network Administrators that want to understand the pragmatic applications of the Common Body of Knowledge
  • Managers that want to understand information security beyond simple terminology and concepts
  • Anyone new to information security with some background in information systems and networking
  • Candidates may also wish to use GISP certification as an independent assessment of your mastery of the (ISC)2 Common Body of Knowledge

No matter who want to pass GISP certification exam, you need to get valid GISP exam questions as your preparation materials. Here we recommend you GIAC Information Security Professional (GISP) Exam Questions.

Free Demo Questions of GISP Exam Questions

1. Which of the following layers of the OSI model provides end-to-end service?

2. These are false reports about non-existent viruses. In these reports, the writer often claims to do impossible things. Due to these false reports, the network administrator shuts down his network, which in turn affects the work of the company. These reports falsely claim to describe an extremely dangerous virus, and declare that the report is issued by a reputed company. These reports are known as __________.

3. Which of the following statements are true about a Gantt chart?
Each correct answer represents a complete solution. Choose all that apply.

4. Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?

5. Mark the list that mentions the correct levels of classification of the military data-classification system.

6. Which of the following processes is known as sanitization?

7. Which of the following are used to suppress gasoline and oil fires?
Each correct answer represents a complete solution. Choose three.

8. You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering?
Each correct answer represents a complete solution. Choose two.

9. Which of the following tools can be used to perform polymorphic shell code attacks?

10. Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domainbased network. The company has two offices in different cities. The offices are connected through the Internet. Both offices have a Windows 2003 server named SERV1 and SERV2 respectively. Mark is required to create a secure connection between both offices. He configures a VPN connection between the offices using the two servers. He uses L2TP for VPN and also configures an IPSec tunnel. Which of the following will he achieve with this configuration?
Each correct answer represents a part of the solution. Choose two.

11. Which of the following statements about digital signature is true?

12. Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?

13. Which of the following refers to going through someone's trash to find out useful or confidential information?

14. Which of the following have been developed to address security issues in the e-commerce system?
Each correct answer represents a complete solution. Choose two.

15. Which of the following terms refers to the act of obtaining plain text from cipher text without a cryptographic key?

16. Against which of the following does SSH provide protection?
Each correct answer represents a complete solution. Choose two.

17. John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He recommends a disk encryption tool to encrypt the secret files of the We-are-secure server. He presents a report to the We-are-secure authorities as given below:
Which of the following tools is John recommending for disk encryption on the We-are-secure server?

18. Which of the following protocols is used to securely connect to a private network by a remote client using the Internet?

19. Which of the following categories of UTP cable has maximum data transfer rate of 155 Mbps?

20. Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?


 

Cyber Security Certification Exam GPPA Study Guide
GIAC Security Certification GPYC Exam Questions

Add a Comment

Your email address will not be published. Required fields are marked *