giac gisp practice test

GIAC Information Security Professional

Last exam update: Nov 24 ,2025
Page 1 out of 45. Viewing questions 1-15 out of 667

Question 1

Which of the following is a technique used to attack an Ethernet wired or wireless network?

  • A. DNS poisoning
  • B. Keystroke logging
  • C. Mail bombing
  • D. ARP poisoning
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following refers to encrypted text?

  • A. Plaintext
  • B. Cookies
  • C. Hypertext
  • D. Ciphertext
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which of the following are the benefits of information classification for an organization?

  • A. It helps identify which information is the most sensitive or vital to an organization.
  • B. It ensures that modifications are not made to data by unauthorized personnel or processes.
  • C. It helps identify which protections apply to which information.
  • D. It helps reduce the Total Cost of Ownership (TCO).
Mark Question:
Answer:

A,C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those
resources that are required for them. Which of the following access control models will he use?

  • A. Role-Based Access Control
  • B. Discretionary Access Control
  • C. Mandatory Access Control
  • D. Policy Access Control
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which of the following are methods used for authentication?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Smart card
  • B. Biometrics
  • C. Username and password
  • D. Magnetic stripe card
Mark Question:
Answer:

A,B,C,D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following protocols is used to verify the status of a certificate?

  • A. CEP
  • B. HTTP
  • C. OSPF
  • D. OCSP
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______
characters.

  • A. 32
Mark Question:
Answer:

A

User Votes:
A
50%
Discussions
vote your answer:
A
0 / 1000

Question 8

You work as a Network Administrator for NetTech Inc. The company has a network that consists of
200 client computers and ten database servers. One morning, you find that a hacker is accessing
unauthorized data on a database server on the network. Which of the following actions will you take
to preserve the evidences?
Each correct answer represents a complete solution. Choose three.

  • A. Prevent a forensics experts team from entering the server room.
  • B. Preserve the log files for a forensics expert.
  • C. Prevent the company employees from entering the server room.
  • D. Detach the network cable from the database server.
Mark Question:
Answer:

B,C,D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following heights of fence deters only casual trespassers?

  • A. 3 to 4 feet
  • B. 2 to 2.5 feet
  • C. 8 feet
  • D. 6 to 7 feet
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following statements about role-based access control (RBAC) model is true?

  • A. In this model, a user can access resources according to his role in the organization.
  • B. In this model, the permissions are uniquely assigned to each user account.
  • C. In this model, the same permission is assigned to each user account.
  • D. In this model, the users can access resources according to their seniority.
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following statements about a fiber-optic cable are true?
Each correct answer represents a complete solution. Choose three.

  • A. It is immune to electromagnetic interference (EMI).
  • B. It can transmit undistorted signals over great distances.
  • C. It has eight wires twisted into four pairs.
  • D. It uses light pulses for signal transmission.
Mark Question:
Answer:

A,B,D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which of the following statements about the bridge are true?
Each correct answer represents a complete solution. Choose two.

  • A. It filters traffic based on IP addresses.
  • B. It forwards broadcast packets.
  • C. It assigns a different network address per port.
  • D. It filters traffic based on MAC addresses.
Mark Question:
Answer:

B,D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web
browser receives information and downloads content from Web sites. Which of the following
browser settings will Sam use to accomplish this?

  • A. Proxy server
  • B. Security
  • C. Cookies
  • D. Certificate
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following are used to suppress paper or wood fires?
Each correct answer represents a complete solution. Choose two.

  • A. Water
  • B. Kerosene
  • C. CO2
  • D. Soda acid
Mark Question:
Answer:

A,D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Which of the following steps can be taken to protect laptops and data they hold?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Use slot locks with cable to connect the laptop to a stationary object.
  • B. Keep inventory of all laptops including serial numbers.
  • C. Harden the operating system.
  • D. Encrypt all sensitive data.
Mark Question:
Answer:

A,B,C,D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2