Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GIAC Certification GISP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISP Premium Access

View all detail and faqs for the GISP exam


406 Students Passed

91% Average Score

93% Same Questions
Viewing page 1 out of 14 pages
Viewing questions 1-15 out of questions
Questions # 1:

Which of the following processes is known as Declassification?

Options:

A.

Removing the content from the media so that it is difficult to restore.

B.

Physically destroying the media and the information stored on it.

C.

Assessing the risk involved in making a confidential document available to public.

D.

Verifying the identity of a person, network host, or system process.

Questions # 2:

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Options:

A.

Tunneling

B.

Spoofing

C.

Packet filtering

D.

Packet sniffing

Questions # 3:

Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?

Options:

A.

DNS server

B.

Firewall

C.

Proxy server

D.

WINS server

Questions # 4:

Which of the following is the default port for Secure Shell (SSH)?

Options:

A.

TCP port 443

B.

UDP port 161

C.

UDP port 138

D.

TCP port 22

Questions # 5:

Which of the following tools is NOT used for logging network activities in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Timbersee

B.

PsGetSid

C.

PsLoggedOn

D.

Swatch

Questions # 6:

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

Options:

A.

The transport layer

B.

The session layer

C.

The application layer

D.

The presentation layer

Questions # 7:

Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

Options:

A.

Snooping

B.

Phishing

C.

SYN attack

D.

Spoofing

Questions # 8:

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Snort

B.

SARA

C.

Samhain

D.

Tripwire

Questions # 9:

Which of the following access control models requires centralize database of user accounts?

Options:

A.

User based

B.

Data based

C.

Group based

D.

Partitions based

Questions # 10:

Which of the following needs to be documented to preserve evidences for presentation in court?

Options:

A.

Separation of duties

B.

Account lockout policy

C.

Chain of custody

D.

Incident response policy

Questions # 11:

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

PING

B.

IPCONFIG

C.

TRACERT

D.

NSLOOKUP

Questions # 12:

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

IPSec

B.

S/MIME

C.

PGP

D.

TLS

Questions # 13:

The backup system that stores only those files that have been changed since the last backup is known as ______.

Options:

A.

Full backup

B.

Incremental backup

C.

Differential backup

D.

Filter backup

E.

Exclusive backup

F.

File backup

Questions # 14:

Key escrow is a method of __________.

Options:

A.

Key renewal

B.

Key distribution

C.

Key recovery

D.

key revocation

Questions # 15:

Which of the following statements about certification authority (CA) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is an entity in a network, which manages security credentials and public keys for message encryption.

B.

It issues certificates that confirm the identity and other attributes of a certificate in relation to other entities.

C.

It is an entity in a network, which manages files and objects.

D.

It issues private keys that confirm the identity and other attributes of a certificate in relation to other entities.

Viewing page 1 out of 14 pages
Viewing questions 1-15 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.