GISP GIAC Information Security Professional Free Practice Exam Questions (2025 Updated)
Prepare effectively for your GIAC GISP GIAC Information Security Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.
What is the hash value length of the Secure Hash Algorithm (SHA-1)?
You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?
Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?
Which of the following protocols is responsible for the resolution of IP addresses to media access control (MAC) addresses?
Which of the following is a process of monitoring data packets that travel across a network?
Which of the following are intrusion detection device?
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?
Which of the following statements about RSA algorithm are true?
Each correct answer represents a complete solution. Choose two.
Which of the following tools is used for breaking digital watermark?
Which of the following types of computers is used for attracting potential intruders?
Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?
Which of the following refers to going through someone's trash to find out useful or confidential information?
Which of the following policies is set by a network administrator to allow users to keep their emails and documents for a fixed period of time?
Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?
Which of the following statements about Due Care policy is true?
John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?
You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS). You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish this?
Which of the following are the responsibilities of the owner with regard to data in an information classification program?
Each correct answer represents a complete solution. Choose three.
Fill in the blank with the appropriate term.
A ___________ is a digital representation of information that identifies authorized users on the Internet and intranets.
Which of the following statements about Discretionary Access Control List (DACL) is true?
Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?
Which of the following tools can be used to perform polymorphic shell code attacks?
Which of the following components come under the network layer of the OSI model?
Each correct answer represents a complete solution. Choose two.
Which of the following methods backs up all changes made since the last full or normal backup?
Which of the following functions are performed by a firewall?
Each correct answer represents a complete solution. Choose all that apply.
You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering?
Each correct answer represents a complete solution. Choose two.
Mark the list that mentions the correct levels of classification of the military data-classification system.
Which of the following statements about extranet are true?
Each correct answer represents a complete solution. Choose two.
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
Which of the following terms refers to the act of obtaining plain text from cipher text without a cryptographic key?