{"id":3375,"date":"2019-04-13T01:13:19","date_gmt":"2019-04-13T01:13:19","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=3375"},"modified":"2019-04-13T01:13:21","modified_gmt":"2019-04-13T01:13:21","slug":"giac-information-security-professional-gisp-exam-questions","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/giac-information-security-professional-gisp-exam-questions.html","title":{"rendered":"GIAC Information Security Professional (GISP) Exam Questions"},"content":{"rendered":"\n<p>Who would like to take GISP exam?<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Security Professionals that want to fill the gaps in their understanding of technical information security<\/li><li>System, Security, and Network Administrators that want to understand the pragmatic applications of the Common Body of Knowledge<\/li><li>Managers that want to understand information security beyond simple terminology and concepts<\/li><li>Anyone new to information security with some background in information systems and networking<\/li><li>Candidates may also wish to use GISP certification as an independent assessment of your mastery of the (ISC)2 Common Body of Knowledge<\/li><\/ul>\n\n\n\n<p>No matter who want to pass GISP certification exam, you need to get valid GISP exam questions as your preparation materials. Here we recommend you GIAC Information Security Professional (GISP) Exam Questions.<\/p>\n\n\n\n<p class=\"has-text-color has-medium-font-size has-vivid-red-color\"><strong><em>Free Demo Questions of GISP Exam Questions<\/em><\/strong><\/p>\n\n\n\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam213\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-213\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-213\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-4112'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>Which of the following layers of the OSI model provides end-to-end service? <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_1' value='4112' \/><input type='hidden' id='answerType4112' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4112[]' id='answer-id-18006' class='answer   answerof-4112 ' value='18006'   \/><label for='answer-id-18006' id='answer-label-18006' class=' answer'><span>The physical layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4112[]' id='answer-id-18007' class='answer   answerof-4112 ' value='18007'   \/><label for='answer-id-18007' id='answer-label-18007' class=' answer'><span>The application layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4112[]' id='answer-id-18008' class='answer   answerof-4112 ' value='18008'   \/><label for='answer-id-18008' id='answer-label-18008' class=' answer'><span>The session layer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4112[]' id='answer-id-18009' class='answer   answerof-4112 ' value='18009'   \/><label for='answer-id-18009' id='answer-label-18009' class=' answer'><span>The transport layer<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-4113'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>These are false reports about non-existent viruses. In these reports, the writer often claims to do impossible things. Due to these false reports, the network administrator shuts down his network, which in turn affects the work of the company. These reports falsely claim to describe an extremely dangerous virus, and declare that the report is issued by a reputed company. These reports are known as __________. <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_2' value='4113' \/><input type='hidden' id='answerType4113' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4113[]' id='answer-id-18010' class='answer   answerof-4113 ' value='18010'   \/><label for='answer-id-18010' id='answer-label-18010' class=' answer'><span>Time bombs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4113[]' id='answer-id-18011' class='answer   answerof-4113 ' value='18011'   \/><label for='answer-id-18011' id='answer-label-18011' class=' answer'><span>Virus hoaxes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4113[]' id='answer-id-18012' class='answer   answerof-4113 ' value='18012'   \/><label for='answer-id-18012' id='answer-label-18012' class=' answer'><span>Chain letters<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4113[]' id='answer-id-18013' class='answer   answerof-4113 ' value='18013'   \/><label for='answer-id-18013' id='answer-label-18013' class=' answer'><span>Spambots<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4113[]' id='answer-id-18014' class='answer   answerof-4113 ' value='18014'   \/><label for='answer-id-18014' id='answer-label-18014' class=' answer'><span>Logic bombs<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-4114'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>Which of the following statements are true about a Gantt chart? <br \/>\r\nEach correct answer represents a complete solution. Choose all that apply. <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_3' value='4114' \/><input type='hidden' id='answerType4114' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4114[]' id='answer-id-18015' class='answer   answerof-4114 ' value='18015'   \/><label for='answer-id-18015' id='answer-label-18015' class=' answer'><span>It displays the duration of a task.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4114[]' id='answer-id-18016' class='answer   answerof-4114 ' value='18016'   \/><label for='answer-id-18016' id='answer-label-18016' class=' answer'><span>It is easier to plan than PER<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4114[]' id='answer-id-18017' class='answer   answerof-4114 ' value='18017'   \/><label for='answer-id-18017' id='answer-label-18017' class=' answer'><span>It displays dependencies between activities.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4114[]' id='answer-id-18018' class='answer   answerof-4114 ' value='18018'   \/><label for='answer-id-18018' id='answer-label-18018' class=' answer'><span>The impact of slippage is easily determined.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-4115'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources? <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_4' value='4115' \/><input type='hidden' id='answerType4115' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4115[]' id='answer-id-18019' class='answer   answerof-4115 ' value='18019'   \/><label for='answer-id-18019' id='answer-label-18019' class=' answer'><span>Terminal service<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4115[]' id='answer-id-18020' class='answer   answerof-4115 ' value='18020'   \/><label for='answer-id-18020' id='answer-label-18020' class=' answer'><span>DFS service<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4115[]' id='answer-id-18021' class='answer   answerof-4115 ' value='18021'   \/><label for='answer-id-18021' id='answer-label-18021' class=' answer'><span>SMTP service<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4115[]' id='answer-id-18022' class='answer   answerof-4115 ' value='18022'   \/><label for='answer-id-18022' id='answer-label-18022' class=' answer'><span>Directory service<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-4116'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>Mark the list that mentions the correct levels of classification of the military data-classification system. <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_5' value='4116' \/><input type='hidden' id='answerType4116' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4116[]' id='answer-id-18023' class='answer   answerof-4116 ' value='18023'   \/><label for='answer-id-18023' id='answer-label-18023' class=' answer'><span>-4<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-4117'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>Which of the following processes is known as sanitization? <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_6' value='4117' \/><input type='hidden' id='answerType4117' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4117[]' id='answer-id-18024' class='answer   answerof-4117 ' value='18024'   \/><label for='answer-id-18024' id='answer-label-18024' class=' answer'><span>Physically destroying the media and the information stored on it.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4117[]' id='answer-id-18025' class='answer   answerof-4117 ' value='18025'   \/><label for='answer-id-18025' id='answer-label-18025' class=' answer'><span>Assessing the risk involved in discarding particular information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4117[]' id='answer-id-18026' class='answer   answerof-4117 ' value='18026'   \/><label for='answer-id-18026' id='answer-label-18026' class=' answer'><span>Verifying the identity of a person, network host, or system process.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4117[]' id='answer-id-18027' class='answer   answerof-4117 ' value='18027'   \/><label for='answer-id-18027' id='answer-label-18027' class=' answer'><span>Removing the content from the media so that it is difficult to restore.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-4118'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>Which of the following are used to suppress gasoline and oil fires? <br \/>\r\nEach correct answer represents a complete solution. Choose three. <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_7' value='4118' \/><input type='hidden' id='answerType4118' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4118[]' id='answer-id-18028' class='answer   answerof-4118 ' value='18028'   \/><label for='answer-id-18028' id='answer-label-18028' class=' answer'><span>Water<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4118[]' id='answer-id-18029' class='answer   answerof-4118 ' value='18029'   \/><label for='answer-id-18029' id='answer-label-18029' class=' answer'><span>CO2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4118[]' id='answer-id-18030' class='answer   answerof-4118 ' value='18030'   \/><label for='answer-id-18030' id='answer-label-18030' class=' answer'><span>Halon<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4118[]' id='answer-id-18031' class='answer   answerof-4118 ' value='18031'   \/><label for='answer-id-18031' id='answer-label-18031' class=' answer'><span>Soda acid<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-4119'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering? <br \/>\r\nEach correct answer represents a complete solution. Choose two. <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_8' value='4119' \/><input type='hidden' id='answerType4119' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4119[]' id='answer-id-18032' class='answer   answerof-4119 ' value='18032'   \/><label for='answer-id-18032' id='answer-label-18032' class=' answer'><span>Load balancing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4119[]' id='answer-id-18033' class='answer   answerof-4119 ' value='18033'   \/><label for='answer-id-18033' id='answer-label-18033' class=' answer'><span>Ease of maintenance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4119[]' id='answer-id-18034' class='answer   answerof-4119 ' value='18034'   \/><label for='answer-id-18034' id='answer-label-18034' class=' answer'><span>Failover<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4119[]' id='answer-id-18035' class='answer   answerof-4119 ' value='18035'   \/><label for='answer-id-18035' id='answer-label-18035' class=' answer'><span>Reduce power consumption<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-4120'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>Which of the following tools can be used to perform polymorphic shell code attacks? <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_9' value='4120' \/><input type='hidden' id='answerType4120' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4120[]' id='answer-id-18036' class='answer   answerof-4120 ' value='18036'   \/><label for='answer-id-18036' id='answer-label-18036' class=' answer'><span>TrueCrypt<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4120[]' id='answer-id-18037' class='answer   answerof-4120 ' value='18037'   \/><label for='answer-id-18037' id='answer-label-18037' class=' answer'><span>Fragroute<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4120[]' id='answer-id-18038' class='answer   answerof-4120 ' value='18038'   \/><label for='answer-id-18038' id='answer-label-18038' class=' answer'><span>Mendax<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4120[]' id='answer-id-18039' class='answer   answerof-4120 ' value='18039'   \/><label for='answer-id-18039' id='answer-label-18039' class=' answer'><span>ADMutate<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-4121'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domainbased network. The company has two offices in different cities. The offices are connected through the Internet. Both offices have a Windows 2003 server named SERV1 and SERV2 respectively. Mark is required to create a secure connection between both offices. He configures a VPN connection between the offices using the two servers. He uses L2TP for VPN and also configures an IPSec tunnel. Which of the following will he achieve with this configuration? <br \/>\r\nEach correct answer represents a part of the solution. Choose two. <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_10' value='4121' \/><input type='hidden' id='answerType4121' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4121[]' id='answer-id-18040' class='answer   answerof-4121 ' value='18040'   \/><label for='answer-id-18040' id='answer-label-18040' class=' answer'><span>Highest possible encryption for traffic between the offices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4121[]' id='answer-id-18041' class='answer   answerof-4121 ' value='18041'   \/><label for='answer-id-18041' id='answer-label-18041' class=' answer'><span>Encryption for the local files stored on the two servers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4121[]' id='answer-id-18042' class='answer   answerof-4121 ' value='18042'   \/><label for='answer-id-18042' id='answer-label-18042' class=' answer'><span>Extra bandwidth on the Internet connection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4121[]' id='answer-id-18043' class='answer   answerof-4121 ' value='18043'   \/><label for='answer-id-18043' id='answer-label-18043' class=' answer'><span>Mutual authentication between the two servers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-4122'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>Which of the following statements about digital signature is true? <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_11' value='4122' \/><input type='hidden' id='answerType4122' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4122[]' id='answer-id-18044' class='answer   answerof-4122 ' value='18044'   \/><label for='answer-id-18044' id='answer-label-18044' class=' answer'><span>Digital signature compresses the message to which it is applied.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4122[]' id='answer-id-18045' class='answer   answerof-4122 ' value='18045'   \/><label for='answer-id-18045' id='answer-label-18045' class=' answer'><span>Digital signature is required for an e-mail message to get through a firewall.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4122[]' id='answer-id-18046' class='answer   answerof-4122 ' value='18046'   \/><label for='answer-id-18046' id='answer-label-18046' class=' answer'><span>Digital signature verifies the identity of the person who applies it to a document.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4122[]' id='answer-id-18047' class='answer   answerof-4122 ' value='18047'   \/><label for='answer-id-18047' id='answer-label-18047' class=' answer'><span>Digital signature decrypts the contents of documents.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-4123'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer? <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_12' value='4123' \/><input type='hidden' id='answerType4123' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4123[]' id='answer-id-18048' class='answer   answerof-4123 ' value='18048'   \/><label for='answer-id-18048' id='answer-label-18048' class=' answer'><span>IMAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4123[]' id='answer-id-18049' class='answer   answerof-4123 ' value='18049'   \/><label for='answer-id-18049' id='answer-label-18049' class=' answer'><span>SNMP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4123[]' id='answer-id-18050' class='answer   answerof-4123 ' value='18050'   \/><label for='answer-id-18050' id='answer-label-18050' class=' answer'><span>SMTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4123[]' id='answer-id-18051' class='answer   answerof-4123 ' value='18051'   \/><label for='answer-id-18051' id='answer-label-18051' class=' answer'><span>POP3<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-4124'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>Which of the following refers to going through someone's trash to find out useful or confidential information? <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_13' value='4124' \/><input type='hidden' id='answerType4124' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4124[]' id='answer-id-18052' class='answer   answerof-4124 ' value='18052'   \/><label for='answer-id-18052' id='answer-label-18052' class=' answer'><span>Dumpster diving<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4124[]' id='answer-id-18053' class='answer   answerof-4124 ' value='18053'   \/><label for='answer-id-18053' id='answer-label-18053' class=' answer'><span>Hacking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4124[]' id='answer-id-18054' class='answer   answerof-4124 ' value='18054'   \/><label for='answer-id-18054' id='answer-label-18054' class=' answer'><span>Phishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4124[]' id='answer-id-18055' class='answer   answerof-4124 ' value='18055'   \/><label for='answer-id-18055' id='answer-label-18055' class=' answer'><span>Spoofing<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-4125'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>Which of the following have been developed to address security issues in the e-commerce system? <br \/>\r\nEach correct answer represents a complete solution. Choose two. <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_14' value='4125' \/><input type='hidden' id='answerType4125' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4125[]' id='answer-id-18056' class='answer   answerof-4125 ' value='18056'   \/><label for='answer-id-18056' id='answer-label-18056' class=' answer'><span>Digital cash<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4125[]' id='answer-id-18057' class='answer   answerof-4125 ' value='18057'   \/><label for='answer-id-18057' id='answer-label-18057' class=' answer'><span>Encryption frameworks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4125[]' id='answer-id-18058' class='answer   answerof-4125 ' value='18058'   \/><label for='answer-id-18058' id='answer-label-18058' class=' answer'><span>Shopping cart<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4125[]' id='answer-id-18059' class='answer   answerof-4125 ' value='18059'   \/><label for='answer-id-18059' id='answer-label-18059' class=' answer'><span>Digital signatures<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-4126'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Which of the following terms refers to the act of obtaining plain text from cipher text without a cryptographic key? <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_15' value='4126' \/><input type='hidden' id='answerType4126' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4126[]' id='answer-id-18060' class='answer   answerof-4126 ' value='18060'   \/><label for='answer-id-18060' id='answer-label-18060' class=' answer'><span>Hacking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4126[]' id='answer-id-18061' class='answer   answerof-4126 ' value='18061'   \/><label for='answer-id-18061' id='answer-label-18061' class=' answer'><span>Algorithm<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4126[]' id='answer-id-18062' class='answer   answerof-4126 ' value='18062'   \/><label for='answer-id-18062' id='answer-label-18062' class=' answer'><span>Cryptanalysis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4126[]' id='answer-id-18063' class='answer   answerof-4126 ' value='18063'   \/><label for='answer-id-18063' id='answer-label-18063' class=' answer'><span>Ciphertext<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-4127'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>Against which of the following does SSH provide protection? <br \/>\r\nEach correct answer represents a complete solution. Choose two. <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_16' value='4127' \/><input type='hidden' id='answerType4127' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4127[]' id='answer-id-18064' class='answer   answerof-4127 ' value='18064'   \/><label for='answer-id-18064' id='answer-label-18064' class=' answer'><span>DoS attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4127[]' id='answer-id-18065' class='answer   answerof-4127 ' value='18065'   \/><label for='answer-id-18065' id='answer-label-18065' class=' answer'><span>Password sniffing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4127[]' id='answer-id-18066' class='answer   answerof-4127 ' value='18066'   \/><label for='answer-id-18066' id='answer-label-18066' class=' answer'><span>Broadcast storm<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4127[]' id='answer-id-18067' class='answer   answerof-4127 ' value='18067'   \/><label for='answer-id-18067' id='answer-label-18067' class=' answer'><span>IP spoofing<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-4128'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He recommends a disk encryption tool to encrypt the secret files of the We-are-secure server. He presents a report to the We-are-secure authorities as given below: <br \/>\r\nWhich of the following tools is John recommending for disk encryption on the We-are-secure server? <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_17' value='4128' \/><input type='hidden' id='answerType4128' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4128[]' id='answer-id-18068' class='answer   answerof-4128 ' value='18068'   \/><label for='answer-id-18068' id='answer-label-18068' class=' answer'><span>CryptoHeaven<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4128[]' id='answer-id-18069' class='answer   answerof-4128 ' value='18069'   \/><label for='answer-id-18069' id='answer-label-18069' class=' answer'><span>Stunnel<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4128[]' id='answer-id-18070' class='answer   answerof-4128 ' value='18070'   \/><label for='answer-id-18070' id='answer-label-18070' class=' answer'><span>TrueCrypt<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4128[]' id='answer-id-18071' class='answer   answerof-4128 ' value='18071'   \/><label for='answer-id-18071' id='answer-label-18071' class=' answer'><span>Magic Lantern<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-4129'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>Which of the following protocols is used to securely connect to a private network by a remote client using the Internet? <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_18' value='4129' \/><input type='hidden' id='answerType4129' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4129[]' id='answer-id-18072' class='answer   answerof-4129 ' value='18072'   \/><label for='answer-id-18072' id='answer-label-18072' class=' answer'><span>PAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4129[]' id='answer-id-18073' class='answer   answerof-4129 ' value='18073'   \/><label for='answer-id-18073' id='answer-label-18073' class=' answer'><span>PPTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4129[]' id='answer-id-18074' class='answer   answerof-4129 ' value='18074'   \/><label for='answer-id-18074' id='answer-label-18074' class=' answer'><span>UDP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4129[]' id='answer-id-18075' class='answer   answerof-4129 ' value='18075'   \/><label for='answer-id-18075' id='answer-label-18075' class=' answer'><span>IPSec<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-4130'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>Which of the following categories of UTP cable has maximum data transfer rate of 155 Mbps? <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_19' value='4130' \/><input type='hidden' id='answerType4130' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4130[]' id='answer-id-18076' class='answer   answerof-4130 ' value='18076'   \/><label for='answer-id-18076' id='answer-label-18076' class=' answer'><span>Category 5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4130[]' id='answer-id-18077' class='answer   answerof-4130 ' value='18077'   \/><label for='answer-id-18077' id='answer-label-18077' class=' answer'><span>Category 3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4130[]' id='answer-id-18078' class='answer   answerof-4130 ' value='18078'   \/><label for='answer-id-18078' id='answer-label-18078' class=' answer'><span>Category 7<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4130[]' id='answer-id-18079' class='answer   answerof-4130 ' value='18079'   \/><label for='answer-id-18079' id='answer-label-18079' class=' answer'><span>Category 6<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-4131'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this? <br \/>\r\n<\/div><input type='hidden' name='question_id[]' id='qID_20' value='4131' \/><input type='hidden' id='answerType4131' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4131[]' id='answer-id-18080' class='answer   answerof-4131 ' value='18080'   \/><label for='answer-id-18080' id='answer-label-18080' class=' answer'><span>Challenge Handshake Authentication Protocol (CHAP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4131[]' id='answer-id-18081' class='answer   answerof-4131 ' value='18081'   \/><label for='answer-id-18081' id='answer-label-18081' class=' answer'><span>Extensible Authentication Protocol (EAP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4131[]' id='answer-id-18082' class='answer   answerof-4131 ' value='18082'   \/><label for='answer-id-18082' id='answer-label-18082' class=' answer'><span>Open Shortest Path First (OSPF)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-4131[]' id='answer-id-18083' class='answer   answerof-4131 ' value='18083'   \/><label for='answer-id-18083' id='answer-label-18083' class=' answer'><span>Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-21'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons213\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"213\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-01 09:30:06\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1777627806\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"4112:18006,18007,18008,18009 | 4113:18010,18011,18012,18013,18014 | 4114:18015,18016,18017,18018 | 4115:18019,18020,18021,18022 | 4116:18023 | 4117:18024,18025,18026,18027 | 4118:18028,18029,18030,18031 | 4119:18032,18033,18034,18035 | 4120:18036,18037,18038,18039 | 4121:18040,18041,18042,18043 | 4122:18044,18045,18046,18047 | 4123:18048,18049,18050,18051 | 4124:18052,18053,18054,18055 | 4125:18056,18057,18058,18059 | 4126:18060,18061,18062,18063 | 4127:18064,18065,18066,18067 | 4128:18068,18069,18070,18071 | 4129:18072,18073,18074,18075 | 4130:18076,18077,18078,18079 | 4131:18080,18081,18082,18083\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"4112,4113,4114,4115,4116,4117,4118,4119,4120,4121,4122,4123,4124,4125,4126,4127,4128,4129,4130,4131\";\nWatuPROSettings[213] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 213;\t    \nWatuPRO.post_id = 3375;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.10666400 1777627806\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(213);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Who would like to take GISP exam? Security Professionals that want to fill the gaps in their understanding of technical information security System, Security, and Network Administrators that want to understand the pragmatic applications of the Common Body of Knowledge Managers that want to understand information security beyond simple terminology and concepts Anyone new to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[415,416],"tags":[5929,5927,5930,5933,5928,5932,5931],"class_list":["post-3375","post","type-post","status-publish","format-standard","hentry","category-giac","category-giac-information-security","tag-giac-gisp-exam","tag-gisp","tag-gisp-certification-exam","tag-gisp-exam-dumps","tag-gisp-exam-questions","tag-gisp-practice-exam","tag-gisp-test-questions"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/3375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=3375"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/3375\/revisions"}],"predecessor-version":[{"id":3376,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/3375\/revisions\/3376"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=3375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=3375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=3375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}