GISP GIAC Information Security Professional Free Practice Exam Questions (2025 Updated)
Prepare effectively for your GIAC GISP GIAC Information Security Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.
Which of the following is used by the Diffie-Hellman encryption algorithm?
Which of the following needs to be documented to preserve evidences for presentation in court?
Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?
Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?
Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.
Which of the following processes removes data from the media so that it is difficult to restore?
Fill in the blank with the appropriate layer name of the OSI model.
Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.
Which of the following services are provided by Remote Authentication Dial-In User Service (RADIUS)?
Each correct answer represents a complete solution. Choose three.
Which of the following IP addresses are private addresses?
Each correct answer represents a complete solution. Choose all that apply.
Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.
Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?
Which of the following protocols is used to send e-mails on the Internet?
Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?
Which of the following statements about digital signature are true?
Each correct answer represents a complete solution. Choose two.
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against
__________.
Which of the following statements about incremental backup are true?
Each correct answer represents a complete solution. Choose two.
Which of the following is the default port for DNS zone transfer?
Which of the following protocols is responsible for requesting Web pages from a Web server and sending back the responses to the Web browser?
John works as a C programmer. He develops the following C program:
#include
#include
#include
int buffer(char *str) {
char buffer1[10];
strcpy(buffer1, str);
return 1;
}
int main(int argc, char *argv[]) {
buffer (argv[1]);
printf("Executed\n");
return 1;
}
His program is vulnerable to a __________ attack.
You are going to upgrade your hard disk's file system from FAT to NTFS. What are the major advantages of the NTFS file system over FAT16 and FAT32 file systems?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following provides the best protection against a man-in-the-middle attack?
Which of the following are advantages of NTFS file system over FAT32 and FAT?
Each correct answer represents a part of the solution. Choose two.
Which of the following protocols provides functionalities for advanced management associated with the use of digital certificates such as certificate issuance, exchange, and revocation?
You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following hardware devices prevents broadcasts from crossing over subnets?
Which of the following are the responsibilities of the custodian of data?
Each correct answer represents a complete solution. Choose two.
Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true?
Each correct answer represents a complete solution. Choose two.
An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?
Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following access control models uses a predefined set of access privileges for an object of a system?