Summer Sale Coupon - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sbfdisc

GISP PDF

$44

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

GISP PDF + Testing Engine

$70.4

$175.99

3 Months Free Update

  • Exam Name: GIAC¬†Information Security Professional
  • Last Update: Apr 17, 2024
  • Questions and Answers: 659
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

GISP Engine

$52.8

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

GISP Practice Exam Questions with Answers GIAC Information Security Professional Certification

Question # 6

Which of the following statements about Microsoft hotfix are true?

Each correct answer represents a complete solution. Choose two.

A.

It is the term used by Microsoft for major service pack releases.

B.

It is generally related to security problems.

C.

It is a collection of files used by Microsoft for software updates released between major service pack releases.

D.

It is generally related to the problems of a Web server's performance.

Full Access
Question # 7

Which of the following is the default port for TACACS?

A.

UDP port 49

B.

TCP port 443

C.

TCP port 25

D.

TCP port 80

Full Access
Question # 8

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the TFN and Trin00 tools to test the security of the We-aresecure server, so that he can check whether the server is vulnerable or not. Using these tools, which of the following attacks can John perform to test the security of the We-are-secure server?

A.

Reply attack

B.

Cross site scripting attack

C.

DDoS attack

D.

Brute force attack

Full Access
Question # 9

Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

A.

Integrity

B.

Privacy

C.

Confidentiality

D.

Availability

Full Access
Question # 10

Which of the following statements are true about worms?

Each correct answer represents a complete solution. Choose all that apply.

A.

Worms can exist inside files such as Word or Excel documents.

B.

Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

C.

One feature of worms is keystroke logging.

D.

Worms replicate themselves from one system to another without using a host file.

Full Access
Question # 11

Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?

A.

Spam

B.

Artistic license

C.

Patent

D.

Phishing

Full Access
Question # 12

Which of the following protocols work at the network layer?

Each correct answer represents a complete solution. Choose three.

A.

OSPF

B.

SPX

C.

IGMP

D.

RIP

Full Access
Question # 13

In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?

A.

Remote dial-up network

B.

Remote network

C.

Stolen equipment

D.

Local network

Full Access
Question # 14

Which of the following provides secure online payment services?

A.

CA

B.

IEEE

C.

ACH

D.

ICSA

Full Access
Question # 15

Which of the following processes is known as Declassification?

A.

Verifying the identity of a person, network host, or system process.

B.

Physically destroying the media and the information stored on it.

C.

Assessing the risk involved in making a confidential document available to public.

D.

Removing the content from the media so that it is difficult to restore.

Full Access
Question # 16

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

A.

Cryptanalysis

B.

Kerberos

C.

Cryptographer

D.

Cryptography

Full Access
Question # 17

Which of the following types of evidence is considered as the best evidence?

A.

A copy of the original document

B.

A computer-generated record

C.

Information gathered through the witness's senses

D.

The original document

Full Access
Question # 18

Which of the following provides high availability of data?

A.

RAID

B.

Anti-virus software

C.

Backup

D.

EFS

Full Access
Question # 19

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company.

To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

A.

Email spoofing

B.

Social engineering

C.

Web ripping

D.

Steganography

Full Access
Question # 20

SSL session keys are available in which of the following lengths?

A.

64-bit and 128-bit.

B.

40-bit and 64-bit.

C.

128-bit and 1,024-bit.

D.

40-bit and 128-bit.

Full Access
Question # 21

Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?

A.

National Institute of Standards and Technology (NIST)

B.

Request for Comments (RFC)

C.

Central Security Service (CSS)

D.

National Security Agency (NSA)

E.

American Bankers Association

F.

International Telecommunications Union

Full Access
Question # 22

Which of the following encryption methods comes under symmetric encryption algorithm?

Each correct answer represents a complete solution. Choose three.

A.

Blowfish

B.

DES

C.

Diffie-Hellman

D.

RC5

Full Access
Question # 23

Which of the following rate systems of Orange book has mandatory protection of the Trusted Computing Base (TCB)?

A.

B-rated system

B.

A-rated system

C.

D-rated system

D.

C-Rated system

Full Access
Question # 24

Which of the following is the rating for gasoline or oil fires?

A.

Class B

B.

Class D

C.

Class A

D.

Class C

Full Access
Question # 25

Which of the following types of fire comes under Class K fire?

A.

Cooking oil fire

B.

Electrical fire

C.

Wooden fire

D.

Combustible metal fire

Full Access
Question # 26

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.

A.

transport

Full Access
Question # 27

Identify whether the given statement is true or false.

"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

A.

False

B.

True

Full Access
Question # 28

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

A.

Spoofing

B.

System hardening

C.

Shielding

D.

Auditing

Full Access
Question # 29

Which of the following ports is used by a BOOTP server?

A.

UDP port 389

B.

UDP port 67

C.

TCP port 80

D.

TCP port 110

Full Access
Question # 30

Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?

A.

DNS server

B.

Firewall

C.

Proxy server

D.

WINS server

Full Access
Question # 31

Which of the following processes removes data from the media so that it is difficult to restore?

A.

Overwriting

B.

Degaussing

C.

Sanitization

D.

Declassification

Full Access
Question # 32

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

A.

Implement a proxy server on the network.

B.

Implement firewall on the network.

C.

Connect a router to the network.

D.

Connect a brouter to the network.

Full Access
Question # 33

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

A.

Rootkit

B.

Backdoor

C.

Access control list

D.

Rainbow table

Full Access
Question # 34

Which of the following is not a level of military data-classification system?

A.

Unclassified

B.

Normal

C.

Confidential

D.

Top secret

Full Access
Question # 35

The _______ protocol allows applications to communicate across a network in a way designed to prevent eavesdropping and message forgery.

A.

PPP

B.

TCP

C.

EAP

D.

TLS

Full Access
Question # 36

Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?

A.

64-bit

B.

16-bit

C.

32-bit

D.

128-bit

Full Access
Question # 37

International Data Encryption Algorithm (IDEA) is a __________ block cipher.

A.

32-bit

B.

128-bit

C.

16-bit

D.

64-bit

Full Access
Question # 38

How many voice channels are available in a T2 line?

A.

1

B.

10

C.

24

D.

34

Full Access
Question # 39

Fill in the blanks with the appropriate values.

International Data Encryption Algorithm (IDEA) is a _____ -bit block cipher that uses a ________-bit key.

A.

64,128

Full Access
Question # 40

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

A.

Visitors

B.

Customers

C.

Employees

D.

Hackers

Full Access
Question # 41

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails.

Which of the following will you use to accomplish this?

A.

PPTP

B.

IPSec

C.

PGP

D.

NTFS

Full Access
Question # 42

An attacker sends a large number of packets to a target computer that causes denial of service. Which of the following type of attacks is this?

A.

Flooding

B.

Snooping

C.

Phishing

D.

Spoofing

Full Access
Question # 43

Which of the following technologies are forms of single sign-on (SSO)?

Each correct answer represents a complete solution. Choose three.

A.

CoSign

B.

Kerberos

C.

RADIUS

D.

SESAME

Full Access
Question # 44

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

A.

The transport layer

B.

The session layer

C.

The application layer

D.

The presentation layer

Full Access
Question # 45

Which of the following types of virus is capable of changing its signature to avoid detection?

A.

Macro virus

B.

Polymorphic virus

C.

Stealth virus

D.

Boot sector virus

Full Access
Question # 46

Which of the following needs to be documented to preserve evidences for presentation in court?

A.

Separation of duties

B.

Account lockout policy

C.

Chain of custody

D.

Incident response policy

Full Access
Question # 47

The backup system that stores only those files that have been changed since the last backup is known as ______.

A.

Full backup

B.

Incremental backup

C.

Differential backup

D.

Filter backup

E.

Exclusive backup

F.

File backup

Full Access
Question # 48

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

A.

Shielding

B.

Eavesdropping

C.

Spoofing

D.

Packaging

Full Access
Question # 49

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

A.

Spoofing

B.

Auditing

C.

Shielding

D.

System hardening

Full Access
Question # 50

You are a salesperson. You are authorized to access only the information that is essential for your work. Which of the following access control models is used in your organization?

A.

Role-Based Access Control

B.

Discretionary Access Control

C.

Mandatory Access Control

D.

Rule-Based Access Control

E.

Privilege Access Control

Full Access
Question # 51

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Eavesdropping

B.

Dumpster diving

C.

Placing a backdoor

D.

Shoulder surfing

Full Access
Question # 52

Which of the following processes is known as Declassification?

A.

Removing the content from the media so that it is difficult to restore.

B.

Physically destroying the media and the information stored on it.

C.

Assessing the risk involved in making a confidential document available to public.

D.

Verifying the identity of a person, network host, or system process.

Full Access
Question # 53

Which of the following protocols is used with a tunneling protocol to provide security?

A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Full Access
Question # 54

Which of the following is used by attackers to obtain an authenticated connection on a network?

A.

Back door

B.

Replay attack

C.

Denial-of-Service (DoS) attack

D.

Man-in-the-middle attack

Full Access
Question # 55

Which of the following is the default port for Secure Shell (SSH)?

A.

TCP port 443

B.

UDP port 161

C.

UDP port 138

D.

TCP port 22

Full Access
Question # 56

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

A.

PGP

B.

Symmetric

C.

S/MIME

D.

Asymmetric

Full Access
Question # 57

Which of the following protocols work at the session layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

A.

File Transfer Protocol (FTP)

B.

Remote Procedure Call (RPC)

C.

Network File System (NFS)

D.

Transmission Control Protocol (TCP)

Full Access
Question # 58

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

Snort

B.

SARA

C.

Samhain

D.

Tripwire

Full Access
Question # 59

Which of the following encryption algorithms are based on stream ciphers?

Each correct answer represents a complete solution. Choose two.

A.

Twofish

B.

RC4

C.

FISH

D.

Blowfish

Full Access
Question # 60

Which of the following statements best describes VeriSign?

A.

It is an authentication server.

B.

It is a certification authority.

C.

It is an encryption technology.

D.

It is a signature verification utility.

Full Access
Question # 61

Which of the following are tunneling protocols?

Each correct answer represents a complete solution. Choose two.

A.

NNTP

B.

SMTP

C.

L2TP

D.

PPTP

Full Access
Question # 62

Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?

A.

Type II

B.

Type I

C.

Type III

D.

Type IV

Full Access
Question # 63

These are false reports about non-existent viruses. In these reports, the writer often claims to do impossible things. Due to these false reports, the network administrator shuts down his network, which in turn affects the work of the company. These reports falsely claim to describe an extremely dangerous virus, and declare that the report is issued by a reputed company. These reports are known as __________.

A.

Time bombs

B.

Virus hoaxes

C.

Chain letters

D.

Spambots

E.

Logic bombs

Full Access
Question # 64

Which of the following rate systems of the Orange book has no security controls?

A.

C-rated

B.

D-rated

C.

A-rated

D.

E-rated

Full Access
Question # 65

Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?

A.

Access control list (ACL)

B.

Discretionary access control entry (DACE)

C.

Security Identifier (SID)

D.

Access control entry (ACE)

Full Access
Question # 66

Fill in the blank with the appropriate value.

Primary Rate Interface (PRI) of an ISDN connection contains _______ B channels and ______ D channel.

A.

23,1

Full Access
Question # 67

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

A.

SPAP

B.

MSCHAP V2

C.

PAP

D.

MSCHAP

Full Access
Question # 68

Which of the following policies is set by a network administrator to allow users to keep their emails and documents for a fixed period of time?

A.

Retention policy

B.

Password policy

C.

Audit policy

D.

Backup policy

Full Access
Question # 69

Which of the following statements about the One Time Password (OTP) security system are true?

Each correct answer represents a complete solution. Choose two.

A.

It requires a password only once to authenticate users.

B.

It requires a new password every time a user authenticates himself.

C.

It generates passwords by using either the MD4 or MD5 hashing algorithm.

D.

It generates passwords by using Kerberos v5.

Full Access
Question # 70

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

A.

RPC

B.

IDLE

C.

UDP

D.

TCP SYN/ACK

Full Access
Question # 71

Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?

A.

Anti-x

B.

LIDS

C.

Scanlogd

D.

KFSensor

Full Access
Question # 72

Which of the following statements about extranet are true?

Each correct answer represents a complete solution. Choose two.

A.

It is an area of a company's Web site, which is only available to selected customers, suppliers, an business partners.

B.

It is an area of a company's Web site, which is available to Internet users.

C.

It is an arrangement commonly used for business-to-business relationships.

D.

It is an arrangement commonly used for a company's employees.

Full Access
Question # 73

You work as a Network Administrator for Infonet Inc. The company's network has an FTP server.

You want to secure the server so that only authorized users can access it. What will you do to accomplish this?

A.

Stop the FTP service on the server.

B.

Disable anonymous authentication.

C.

Disable the network adapter on the server.

D.

Enable anonymous authentication.

Full Access
Question # 74

In which of the following attacks does an attacker send a spoofed TCP SYN packet in which the target's IP address is filled in both the source and destination fields?

A.

Jolt DoS attack

B.

Ping of death attack

C.

Teardrop attack

D.

Land attack

Full Access
Question # 75

Which of the following functions are performed by a firewall?

Each correct answer represents a complete solution. Choose all that apply.

A.

It hides vulnerable computers that are exposed to the Internet.

B.

It logs traffic to and from the private network.

C.

It enhances security through various methods, including packet filtering, circuit-level filtering, and application filtering.

D.

It blocks unwanted traffic.

Full Access
Question # 76

Which of the following statements about Digest authentication are true?

Each correct answer represents a complete solution. Choose two.

A.

In Digest authentication, passwords are sent across a network as clear text, rather than as a has value.

B.

Digest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.

C.

In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.

D.

Digest authentication is a more secure authentication method as compared to Basic authentication.

Full Access
Question # 77

Which of the following refers to going through someone's trash to find out useful or confidential information?

A.

Dumpster diving

B.

Hacking

C.

Phishing

D.

Spoofing

Full Access
Question # 78

Which of the following standards is used in wireless local area networks (WLANs)?

A.

IEEE 802.4

B.

IEEE 802.11b

C.

IEEE 802.5

D.

IEEE 802.3

Full Access
Question # 79

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He writes the following snort rule:

This rule can help him protect the We-are-secure server from the __________.

A.

Chernobyl virus

B.

I LOVE YOU virus

C.

Melissa virus

D.

Nimda virus

Full Access
Question # 80

Which of the following are used to suppress paper or wood fires?

Each correct answer represents a complete solution. Choose two.

A.

Water

B.

Kerosene

C.

CO2

D.

Soda acid

Full Access
Question # 81

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

A.

Corroborating

B.

Circumstantial

C.

Direct

D.

Incontrovertible

Full Access
Question # 82

Which of the following statements about IPSec are true?

Each correct answer represents a complete solution. Choose two.

A.

It uses Password Authentication Protocol (PAP) for user authentication.

B.

It uses Encapsulating Security Payload (ESP) for data confidentiality.

C.

It uses Internet Protocol (IP) for data integrity.

D.

It uses Authentication Header (AH) for data integrity.

Full Access
Question # 83

Which of the following protocols is responsible for requesting Web pages from a Web server and sending back the responses to the Web browser?

A.

IP

B.

FTP

C.

HTTP

D.

PPP

Full Access
Question # 84

Which of the following protocols is used to retrieve e-mails from a remote mail server?

A.

SNMP

B.

POP3

C.

SMTP

D.

IGMP

Full Access
Question # 85

Which of the following protocols work at the Session layer of the OSI model?

A.

User Datagram Protocol (UDP)

B.

Trivial File Transfer Protocol (TFTP)

C.

Border Gateway Multicast Protocol (BGMP)

D.

Internet Security Association and Key Management Protocol (ISAKMP)

Full Access
Question # 86

Which of the following protocols allows Cisco devices to acquire and utilize digital certificates from Certification Authorities (CAs)?

A.

Extensible Authentication Protocol (EAP)

B.

Certificate Management Protocol (CMP)

C.

Hypertext Transfer Protocol (HTTP)

D.

Certificate Enrollment Protocol (CEP)

Full Access
Question # 87

Which of the following is the default port for DNS zone transfer?

A.

Port 21

B.

Port 80

C.

Port 23

D.

Port 53

Full Access
Question # 88

Which of the following devices reads the destination's MAC address from each incoming data packet and forwards the data packet to its destination?

A.

Hub

B.

Router

C.

Brouter

D.

Switch

Full Access
Question # 89

In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

A.

ARP spoofing

B.

Replay

C.

Brute force

D.

MAC duplicating

Full Access
Question # 90

Which of the following safes are large enough to allow a person to enter?

A.

Wall safes

B.

Floor safes

C.

Vaults

D.

Chests

Full Access
Question # 91

Which of the following is a term used to refer to access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?

A.

Mail bombing

B.

Piggybacking

C.

Spoofing

D.

Snooping

Full Access
Question # 92

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.

A.

Blackbox testing

B.

Port redirection

C.

Firewalking

D.

Brainstorming

Full Access
Question # 93

Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

A.

IPSec

B.

NAT

C.

Firewall

D.

MAC address

Full Access
Question # 94

Which of the following statements is true about transient noise?

A.

It is a momentary low voltage condition.

B.

It is a short duration of power line disruption.

C.

It is a prolonged power supply that is below the normal voltage.

D.

It is an electrical current that does not fluctuate.

Full Access
Question # 95

Which of the following are the phases of the Certification and Accreditation (C&A) process?

Each correct answer represents a complete solution. Choose two.

A.

Auditing

B.

Initiation

C.

Detection

D.

Continuous Monitoring

Full Access
Question # 96

Which of the following types of attacks occurs when attackers enter a system or capture network traffic and make changes to selected files or data packets?

A.

Brute force attack

B.

Teardrop attack

C.

Dictionary attack

D.

Data diddling attack

Full Access
Question # 97

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against

__________.

A.

SNMP enumeration

B.

DNS zone transfer

C.

IIS buffer overflow

D.

NetBIOS NULL session

Full Access
Question # 98

Which of the following OSI model layers handles translation of data into standard format, data compression, and decompression?

A.

Application

B.

Physical

C.

Presentation

D.

Session

Full Access