Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
sale

Want to Unlock All Questions for this Exam?

Full Exam Access, Discussions, No Robots Checks

GIAC GISP Exam Actual Questions

The questions for GISP were last updated on May 6, 2024.
  • Viewing page 1 out of 66 pages.
  • Viewing questions 1-10 out of 654 questions

Topic 1 - Volume A

Question #1 Topic 1

Which of the following is a technique used to attack an Ethernet wired or wireless network?

  • A. DNS poisoning
  • B. Keystroke logging
  • C. Mail bombing
  • D. ARP poisoning
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #2 Topic 1

Which of the following refers to encrypted text?

  • A. Plaintext
  • B. Cookies
  • C. Hypertext
  • D. Ciphertext
Reveal Solution Hide Solution   Discussion   1

Correct Answer: D 🗳️

Question #3 Topic 1

Which of the following are the benefits of information classification for an organization?

  • A. It helps identify which information is the most sensitive or vital to an organization.
  • B. It ensures that modifications are not made to data by unauthorized personnel or processes.
  • C. It helps identify which protections apply to which information.
  • D. It helps reduce the Total Cost of Ownership (TCO).
Reveal Solution Hide Solution   Discussion  

Correct Answer: AC 🗳️

Question #4 Topic 1

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

  • A. Role-Based Access Control
  • B. Discretionary Access Control
  • C. Mandatory Access Control
  • D. Policy Access Control
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #5 Topic 1

Which of the following are methods used for authentication?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Smart card
  • B. Biometrics
  • C. Username and password
  • D. Magnetic stripe card
Reveal Solution Hide Solution   Discussion  

Correct Answer: ABCD 🗳️

Question #6 Topic 1

Which of the following protocols is used to verify the status of a certificate?

  • A. CEP
  • B. HTTP
  • C. OSPF
  • D. OCSP
Reveal Solution Hide Solution   Discussion   1

Correct Answer: D 🗳️

Question #7 Topic 1

SIMULATION -
Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.

Reveal Solution Hide Solution   Discussion  

Correct Answer: 32

Question #8 Topic 1

You work as a Network Administrator for NetTech Inc. The company has a network that consists of 200 client computers and ten database servers. One morning, you find that a hacker is accessing unauthorized data on a database server on the network. Which of the following actions will you take to preserve the evidences?
Each correct answer represents a complete solution. Choose three.

  • A. Prevent a forensics experts team from entering the server room.
  • B. Preserve the log files for a forensics expert.
  • C. Prevent the company employees from entering the server room.
  • D. Detach the network cable from the database server.
Reveal Solution Hide Solution   Discussion  

Correct Answer: BCD 🗳️

Question #9 Topic 1

Which of the following heights of fence deters only casual trespassers?

  • A. 3 to 4 feet
  • B. 2 to 2.5 feet
  • C. 8 feet
  • D. 6 to 7 feet
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #10 Topic 1

model is true?

  • A. In this model, a user can access resources according to his role in the organization.
  • B. In this model, the permissions are uniquely assigned to each user account.
  • C. In this model, the same permission is assigned to each user account.
  • D. In this model, the users can access resources according to their seniority.
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...