GISP GIAC Information Security Professional Free Practice Exam Questions (2025 Updated)
Prepare effectively for your GIAC GISP GIAC Information Security Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.
Which of the following is a name, symbol, or slogan with which a product is identified?
Which of the following statements about Diffie-Hellman encryption are true?
Each correct answer represents a complete solution. Choose two.
Which of the following access control models are used in the commercial sector?
Each correct answer represents a complete solution. Choose two.
Which of the following protocols is used to query and modify information stored within the directory services?
Which of the following is a type of intruder detection that involves logging network events to a file for an administrator to review later?
Which of the following access control models uses a role based method to determine access rights and permission?
Which of the following database types is a collection of tables that are linked by their primary keys?
Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?
Each correct answer represents a complete solution. Choose all that apply.
Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.
Which of the following cables provides maximum security against electronic eavesdropping on a network?
Which of the following statements about Network Address Translation (NAT) are true?
Each correct answer represents a complete solution. Choose two.
Fill in the blank with the appropriate value.
Primary Rate Interface (PRI) of an ISDN connection contains _______ B channels and ______ D channel.
Which of the following is the process of overwriting all addressable locations on a disk?
Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domainbased network. The company has two offices in different cities. The offices are connected through the Internet. Both offices have a Windows 2003 server named SERV1 and SERV2 respectively. Mark is required to create a secure connection between both offices. He configures a VPN connection between the offices using the two servers. He uses L2TP for VPN and also configures an IPSec tunnel. Which of the following will he achieve with this configuration?
Each correct answer represents a part of the solution. Choose two.
Which of the following statements about active attack is true?
Which of the following categories of UTP cable has maximum data transfer rate of 155 Mbps?
Which of the following is the default port for Secure Shell (SSH)?
Which of the following Windows RRAS authentication protocols uses completely unencrypted passwords?
Which of the following statements about smurf is true?
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.
A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?
Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?
Which of the following technologies are forms of single sign-on (SSO)?
Each correct answer represents a complete solution. Choose three.
Which of the following should propose applicable and effective security controls for managing the risks?
Which of the following protocols is used to send e-mails on the Internet?
Which of the following statements about a hoax are true?
Each correct answer represents a complete solution. Choose two.
John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?