Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GISP GIAC Information Security Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GISP GIAC Information Security Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 7
Total 659 questions

Which of the following is used to repair missing or damaged system files that might prevent Windows from starting correctly?

A.

Boot Repair

B.

System Repair

C.

Recovery Repair

D.

Startup Repair

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

A.

Building Risk free systems

B.

Risk control

C.

Risk identification

D.

Assuring the integrity of organizational data

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

A.

Backup policy

B.

Network security policy

C.

User password policy

D.

Privacy policy

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _____ layer of the OSI model.

A.

transport

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

Strong encryption software should be used to store credit card information.

C.

The NTFS file system should be implemented on a client computer.

D.

Limited and authorized access should be allowed on the stored credit card information.

Which of the following is the default port for Secure Shell (SSH)?

A.

TCP port 443

B.

UDP port 161

C.

UDP port 138

D.

TCP port 22

Which of the following classes of fire comes under Class C fire?

A.

Combustible metals fire

B.

Paper or wood fire

C.

Oil fire

D.

Electronic or computer fire

Which of the following ports is used by the control connection on the FTP server?

A.

TCP port 23

B.

TCP port 21

C.

TCP port 53

D.

TCP port 443

Which of the following needs to be documented to preserve evidences for presentation in court?

A.

Separation of duties

B.

Account lockout policy

C.

Chain of custody

D.

Incident response policy

Which of the following methods is a behavior-based IDS detection method?

A.

Knowledge-based detection

B.

Statistical anomaly detection

C.

Pattern matching detection

D.

Protocol detection

Which of the following protocols work at the session layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

A.

File Transfer Protocol (FTP)

B.

Remote Procedure Call (RPC)

C.

Network File System (NFS)

D.

Transmission Control Protocol (TCP)

Which of the following defines the communication link between a Web server and Web applications?

A.

Firewall

B.

IETF

C.

CGI

D.

PGP

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

A.

IPSec

B.

S/MIME

C.

PGP

D.

TLS

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:

•Network diagrams of the we-are-secure infrastructure

•Source code of the security tools

•IP addressing information of the we-are-secure network

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

A.

Graybox

B.

Whitebox

C.

Blackbox

D.

Alpha testing

Routers and firewalls use _______ to determine which packets should be forwarded or dropped.

A.

Encryption

B.

Security audit log

C.

Access control list

D.

Ciphering

Which of the following is a duplicate of the original site of an organization, with fully working systems as well as near-complete backups of user data?

A.

Hot site

B.

Cold site

C.

Data site

D.

Warm site

Which of the following tools was developed by the FBI and is used for keystroke logging in order to capture encryption keys and other information useful for deciphering transmissions?

A.

Alchemy Remote Executor

B.

Stealth Voice Recorder

C.

KeyGhost USB keylogger

D.

KeyGhost keylogger

E.

Magic Lantern

Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?

A.

DNS server

B.

Firewall

C.

Proxy server

D.

WINS server

Which of the following protocols is used with a tunneling protocol to provide security?

A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Brutus is a password cracking tool that can be used to crack the following authentications:

•HTTP (Basic Authentication)

•HTTP (HTML Form/CGI)

•POP3 (Post Office Protocol v3)

•FTP (File Transfer Protocol)

•SMB (Server Message Block)

•Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Brute force attack

C.

Replay attack

D.

Hybrid attack

E.

Man-in-the-middle attack

Which of the following authentication methods is used to access public areas of a Web site?

A.

Anonymous authentication

B.

Multi-factor authentication

C.

Biometrics authentication

D.

Mutual authentication

You are a salesperson. You are authorized to access only the information that is essential for your work. Which of the following access control models is used in your organization?

A.

Role-Based Access Control

B.

Discretionary Access Control

C.

Mandatory Access Control

D.

Rule-Based Access Control

E.

Privilege Access Control

You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?

A.

Enable DNS recursive queries on the DNS server.

B.

Disable DNS reverse lookup on the e-mail server.

C.

Enable DNS reverse lookup on the e-mail server.

D.

Disable DNS recursive queries on the DNS server.

In which of the following processes, a DNS server may return an incorrect IP address, diverting traffic to another computer?

A.

TCP FIN scanning

B.

DNS poisoning

C.

Snooping

D.

TCP SYN scanning

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

A.

Rootkit

B.

Backdoor

C.

Access control list

D.

Rainbow table

An attacker sends a large number of packets to a target computer that causes denial of service. Which of the following type of attacks is this?

A.

Flooding

B.

Snooping

C.

Phishing

D.

Spoofing

Which of the following is not a major concern in traditional business transactions as compare to online transactions?

A.

Bookkeeping

B.

Security

C.

Product Quality

D.

Customer Support

Which of the following federal laws are related to hacking activities?

Each correct answer represents a complete solution. Choose three.

A.

18 U.S.C. 1030

B.

18 U.S.C. 1028

C.

18 U.S.C. 2510

D.

18 U.S.C. 1029

Which of the following statements about Denial-of-Service (DoS) attack are true?

Each correct answer represents a complete solution. Choose three.

A.

It disrupts connections between two computers, preventing communications between services.

B.

It changes the configuration of the TCP/IP protocol.

C.

It saturates network resources.

D.

It disrupts services to a specific computer.

Which of the following processes is known as Declassification?

A.

Removing the content from the media so that it is difficult to restore.

B.

Physically destroying the media and the information stored on it.

C.

Assessing the risk involved in making a confidential document available to public.

D.

Verifying the identity of a person, network host, or system process.

Page: 4 / 7
Total 659 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved