Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GISP GIAC Information Security Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GISP GIAC Information Security Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 6 / 7
Total 659 questions

Which of the following is used by the Diffie-Hellman encryption algorithm?

A.

Password

B.

Access control entry

C.

Key exchange

D.

Access control list

Which of the following needs to be documented to preserve evidences for presentation in court?

A.

Chain of custody

B.

Incident response policy

C.

Account lockout policy

D.

Separation of duties

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

A.

Corroborating

B.

Circumstantial

C.

Direct

D.

Incontrovertible

Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?

A.

National Institute of Standards and Technology (NIST)

B.

Request for Comments (RFC)

C.

Central Security Service (CSS)

D.

National Security Agency (NSA)

E.

American Bankers Association

F.

International Telecommunications Union

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

A.

HTTP

B.

SSL

C.

SNMP

D.

TLS

Which of the following processes removes data from the media so that it is difficult to restore?

A.

Overwriting

B.

Degaussing

C.

Sanitization

D.

Declassification

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.

A.

transport

Which of the following services are provided by Remote Authentication Dial-In User Service (RADIUS)?

Each correct answer represents a complete solution. Choose three.

A.

Authentication

B.

Data encryption

C.

Authorization

D.

Accounting

Which of the following IP addresses are private addresses?

Each correct answer represents a complete solution. Choose all that apply.

A.

10.0.0.3

B.

192.168.15.2

C.

192.166.54.32

D.

19.3.22.17

Fill in the blank with the appropriate value.

Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.

A.

32

Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?

A.

64-bit

B.

16-bit

C.

32-bit

D.

128-bit

Which of the following protocols is used to send e-mails on the Internet?

A.

HTTP

B.

POP3

C.

IMAP4

D.

SMTP

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

A.

Authentication

B.

Non-repudiation

C.

Confidentiality

D.

Integrity

Which of the following statements about digital signature are true?

Each correct answer represents a complete solution. Choose two.

A.

It identifies a user who sends a message.

B.

It is created by implementing a public-key encryption.

C.

It is created by implementing a private-key encryption.

D.

It identifies a user who deletes a message.

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against

__________.

A.

SNMP enumeration

B.

DNS zone transfer

C.

IIS buffer overflow

D.

NetBIOS NULL session

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

A.

It backs up the entire database, including the transaction log.

B.

It is the fastest method of backing up data.

C.

It backs up only the files changed since the most recent backup and clears the archive bit.

D.

It is the slowest method for taking a data backup.

Which of the following is the default port for DNS zone transfer?

A.

Port 21

B.

Port 80

C.

Port 23

D.

Port 53

Which of the following protocols is responsible for requesting Web pages from a Web server and sending back the responses to the Web browser?

A.

IP

B.

FTP

C.

HTTP

D.

PPP

John works as a C programmer. He develops the following C program:

#include

#include

#include

int buffer(char *str) {

char buffer1[10];

strcpy(buffer1, str);

return 1;

}

int main(int argc, char *argv[]) {

buffer (argv[1]);

printf("Executed\n");

return 1;

}

His program is vulnerable to a __________ attack.

A.

Denial-of-Service

B.

SQL injection

C.

Buffer overflow

D.

Cross site scripting

You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?

Each correct answer represents a complete solution. Choose all that apply.

A.

NTFS gives better file security than FAT16 and FAT32.

B.

NTFS file system supports for larger hard disks.

C.

NTFS give improved disk compression than FAT16 and FAT32.

D.

Automatic backup.

Which of the following provides the best protection against a man-in-the-middle attack?

A.

Strong encryption

B.

Fiber-optic cable

C.

Strong password

D.

Firewall

Which of the following are advantages of NTFS file system over FAT32 and FAT?

Each correct answer represents a part of the solution. Choose two.

A.

Support for file and folder level permissions.

B.

Support for dual-booting.

C.

Support for Encrypting File System (EFS).

D.

Support for audio files.

Which of the following protocols provides functionalities for advanced management associated with the use of digital certificates such as certificate issuance, exchange, and revocation?

A.

Hypertext Transfer Protocol Secure (HTTPS)

B.

Certificate Management Protocol (CMP)

C.

Extensible Authentication Protocol-Transport Level Security (EAP-TLS)

D.

Certificate Enrollment Protocol (CEP)

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

The NTFS file system should be implemented on a client computer.

C.

Strong encryption software should be used to store credit card information.

D.

Limited and authorized access should be allowed on the stored credit card information.

Which of the following hardware devices prevents broadcasts from crossing over subnets?

A.

Bridge

B.

Router

C.

Modem

D.

Hub

Which of the following are the responsibilities of the custodian of data?

Each correct answer represents a complete solution. Choose two.

A.

Security of data

B.

User authentication

C.

Maintaining integrity of data

D.

Backing up data

Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true?

Each correct answer represents a complete solution. Choose two.

A.

The server can optionally authenticate the client.

B.

The client always authenticates the server.

C.

The server always authenticates the client.

D.

The client can optionally authenticate the server.

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

A.

Biometrics

B.

Anonymous

C.

Mutual

D.

Multi-factor

Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers?

Each correct answer represents a complete solution. Choose all that apply.

A.

SocketShield

B.

Enum

C.

KFSensor

D.

Sheep dip

Which of the following access control models uses a predefined set of access privileges for an object of a system?

A.

Policy Access Control

B.

Mandatory Access Control

C.

Role-Based Access Control

D.

Discretionary Access Control

Page: 6 / 7
Total 659 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved