GISP GIAC Information Security Professional Free Practice Exam Questions (2025 Updated)
Prepare effectively for your GIAC GISP GIAC Information Security Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.
Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?
Mark works as a Webmaster for Infonet Inc. He sets up an e-commerce site. He wants to accept online payments through credit cards on this site. He wants the credit card numbers to be encrypted. What will Mark do to accomplish the task?
Which of the following methods can be helpful to eliminate social engineering threat?
Each correct answer represents a complete solution. Choose three.
You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer's log:
45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72
Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?
In which of the following does a Web site store information such as user preferences to provide customized services to users?
John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
Which of the following is used to allow or deny access to network resources?
On which of the following does a CGI program execute?
Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.
Fill in the blanks with the appropriate values.
International Data Encryption Algorithm (IDEA) is a ______ -bit block cipher that uses a _____-bit key.
Which of the following statements about asymmetric encryption are true?
Each correct answer represents a complete solution. Choose two.
Which of the following are the primary components of a discretionary access control (DAC) model?
Each correct answer represents a complete solution. Choose two.
Which of the following needs to be documented to preserve evidences for presentation in court?
Which of the following is the most secure policy for a firewall?
Which of the following is used by the Diffie-Hellman encryption algorithm?
Which of the following is used by attackers to obtain an authenticated connection on a network?
Which of the following terms is used for the process of securing a system or a device on a network infrastructure?
Which of the following are types of social engineering attacks?
Each correct answer represents a complete solution. Choose two.
Which of the following types of activities can be audited for security?
Each correct answer represents a complete solution. Choose three.
Which of the following are the goals of risk management?
Each correct answer represents a complete solution. Choose three.
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the TFN and Trin00 tools to test the security of the We-aresecure server, so that he can check whether the server is vulnerable or not. Using these tools, which of the following attacks can John perform to test the security of the We-are-secure server?
Which of the following are the common roles with regard to data in an information classification program?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements are true about worms?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following records is the first entry in a DNS database file?
Which of the following protocols work at the network layer?
Each correct answer represents a complete solution. Choose three.
Which of the following protocols is used to provide security for wireless local area networks (WLANs)?
Which of the following protects from electrical and magnetic induction that causes interference to the power voltage?
Which of the following is used for secure financial transactions over the Internet?
Which of the following services is provided by the message authentication code (MAC) ?