Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GISP GIAC Information Security Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GISP GIAC Information Security Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 5 / 7
Total 659 questions

Which of the following is a type of halon?

A.

Halon C

B.

Halon 1900

C.

Halon 1301

D.

Halon 1300

Which of the following statements about DES (Data Encryption Standard) is true?

A.

Its most widely used symmetric encryption algorithm uses a 56-bit key.

B.

Its most widely used symmetric encryption algorithm uses a 32-bit key.

C.

Its most widely used symmetric encryption algorithm uses a 128-bit key.

D.

Its most widely used symmetric encryption algorithm uses a 64-bit key.

Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?

A.

Single Loss Expectancy x Annualized Rate of Occurrence

B.

ALE before implementing safeguard + ALE after implementing safeguard + annual cost of safeguard

C.

ALE before implementing safeguard - ALE after implementing safeguard - annual cost of safeguar

D.

Asset Value x Exposure factor

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

A.

Visitors

B.

Customers

C.

Employees

D.

Hackers

In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?

A.

Remote network

B.

Remote dial-up network

C.

Stolen equipment

D.

Local network

Which of the following protocols implements VPN using IPSec?

A.

L2TP

B.

SLIP

C.

PPP

D.

PPTP

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

A.

Bridge

B.

Antivirus software

C.

Gateway

D.

Firewall

Identify whether the given statement is true or false.

"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

A.

False

B.

True

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?

A.

Brute force attack

B.

Spoofing

C.

PING attack

D.

SYN attack

Which of the following tools can be used by a user to hide his identity?

Each correct answer represents a complete solution. Choose all that apply.

A.

War dialer

B.

IPchains

C.

Anonymizer

D.

Proxy server

E.

Rootkit

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser 's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?

A.

The site's Web server has heavy traffic.

B.

WINS server has no NetBIOS name entry for the server.

C.

DNS entry is not available for the host name.

D.

The site's Web server is offline.

Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?

A.

CHAP

B.

PAP

C.

EAP

D.

MS-CHAP v2

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

A.

Technical

B.

Administrative

C.

Automatic

D.

Physical

In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

A.

ARP spoofing

B.

Replay

C.

Brute force

D.

MAC duplicating

Which of the following acts as an intermediary between a user on the internal network and a service on the external network such as the Internet?

A.

DNS server

B.

Firewall

C.

Proxy server

D.

WINS server

Which of the following is a source port forwarder and redirector tool?

A.

Fpipe

B.

NMAP

C.

SuperScan

D.

NSLOOKUP

Which of the following types of virus is capable of changing its signature to avoid detection?

A.

Stealth virus

B.

Boot sector virus

C.

Macro virus

D.

Polymorphic virus

Which of the following is executed when a predetermined event occurs?

A.

Worm

B.

Trojan horse

C.

Logic bomb

D.

MAC

Which of the following is not a level of military data-classification system?

A.

Unclassified

B.

Normal

C.

Confidential

D.

Top secret

Which of the following methods is a behavior-based IDS detection method?

A.

Protocol detection

B.

Statistical anomaly detection

C.

Pattern matching detection

D.

Knowledge-based detection

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

A.

Collusion

B.

Eavesdropping

C.

Phishing

D.

Buffer overflow

Which of the following is the most secure method of authentication?

A.

Biometrics

B.

Username and password

C.

Smart card

D.

Anonymous

What are packet sniffers?

A.

Packet sniffers test package security.

B.

Packet sniffers capture the packages as they cross the network.

C.

Packet sniffers encrypt the packages as they cross the network.

D.

Packet sniffers test the packages to verify data integrity.

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

A.

PGP

B.

TLS

C.

IPSec

D.

S/MIME

Which of the following is the method of hiding data within another media type such as graphic or document?

A.

Spoofing

B.

Cryptanalysis

C.

Steganography

D.

Packet sniffing

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Shoulder surfing

B.

Dumpster diving

C.

Placing a backdoor

D.

Eavesdropping

Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?

A.

Snooping

B.

Phishing

C.

SYN attack

D.

Spoofing

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

A.

Rootkit

B.

Backdoor

C.

Access control list

D.

Rainbow table

Which of the following is not a level of military data-classification system?

A.

Unclassified

B.

Normal

C.

Confidential

D.

Top secret

Which of the following task force was formed to examine the impact of Electronic Publishing on the intellectual property rights?

A.

The IIPTF (International Intellectual Property Task Force)

B.

The EPTF (Electronic Publishing Task Force)

C.

The LATF (Langham Act Task Force)

D.

The IITF (Information Infrastructure Task Force)

Page: 5 / 7
Total 659 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved