Certbus > GIAC > GIAC Certifications > GISP > GISP Online Practice Questions and Answers

GISP Online Practice Questions and Answers

Questions 4

Which of the following are used to suppress paper or wood fires? Each correct answer represents a complete solution. Choose two.

A. Water

B. Kerosene

C. CO2

D. Soda acid

Browse 659 Q&As
Questions 5

Which of the following statements about Due Care policy is true?

A. It provides information about new viruses.

B. It is a method used to authenticate users on a network.

C. It identifies the level of confidentiality of information.

D. It is a method for securing database servers.

Browse 659 Q&As
Questions 6

Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?

A. Type II

B. Type I

C. Type III

D. Type IV

Browse 659 Q&As
Questions 7

Which of the following Windows RRAS authentication protocols uses completely unencrypted passwords?

A. PAP

B. MS-CHAP

C. CHAP

D. MS-CHAP v2

Browse 659 Q&As
Questions 8

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

A. Employees

B. Hackers

C. Visitors

D. Customers

Browse 659 Q&As
Questions 9

Which of the following tools is used to flood the local network with random MAC addresses?

A. NETSH

B. NMAP

C. Port scanner

D. Macof

Browse 659 Q&As
Questions 10

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.

A. Blackbox testing

B. Port redirection

C. Firewalking

D. Brainstorming

Browse 659 Q&As
Questions 11

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.

A. File virus

B. Polymorphic virus

C. Stealth virus

D. Multipartite virus

E. Boot sector virus

Browse 659 Q&As
Questions 12

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

A. Sensitive

B. Private

C. Public

D. Unclassified

E. Confidential

F. Secret

Browse 659 Q&As
Questions 13

How many layers does the TCP/IP model consist of?

A. Seven

B. Four

C. Six

D. Five

Browse 659 Q&As
Questions 14

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

A. The transport layer

B. The session layer

C. The application layer

D. The presentation layer

Browse 659 Q&As
Questions 15

Which of the following statements best describes VeriSign?

A. It is an authentication server.

B. It is a certification authority.

C. It is an encryption technology.

D. It is a signature verification utility.

Browse 659 Q&As
Questions 16

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

A. Visitors

B. Customers

C. Employees

D. Hackers

Browse 659 Q&As
Questions 17

Which of the following terms is used for a router that filters traffic before it is passed to the firewall?

A. Screened host

B. Demilitarized zone (DMZ)

C. Bastion host

D. Honey pot

Browse 659 Q&As
Questions 18

In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?

A. Remote network

B. Remote dial-up network

C. Stolen equipment

D. Local network

Browse 659 Q&As
Exam Code: GISP
Exam Name: GIAC Information Security Professional (GISP)
Last Update: Mar 19, 2025
Questions: 659 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99