Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GISP Exam Dumps - GIAC Certification Questions and Answers

Question # 4

Which of the following is referred to as Radio Frequency Interference (RFI) and Electromagnetic Interference (EMI)?

Options:

A.

Spike

B.

Brownout

C.

Electrical line noise

D.

Transient

Buy Now
Question # 5

Which of the following tools can be used to perform tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing?

Options:

A.

Obiwan

B.

Cain

C.

L0phtcrack

D.

John the Ripper

Buy Now
Question # 6

Which of the following need to be reduced to suppress a fire?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Oxygen

B.

Fuel

C.

CO2

D.

High temperature

Buy Now
Question # 7

Which of the following tools can be used by a user to hide his identity?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

War dialer

B.

IPchains

C.

Anonymizer

D.

Proxy server

E.

Rootkit

Buy Now
Question # 8

Samantha works as an Ethical Hacker for we-are-secure Inc. She wants to test the security of the weare- secure server for DoS attacks. She sends large number of ICMP ECHO packets to the target computer. Which of the following DoS attacking techniques will she use to accomplish the task?

Options:

A.

Land attack

B.

Ping flood attack

C.

Smurf dos attack

D.

Teardrop attack

Buy Now
Question # 9

Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?

Options:

A.

HTTPS

B.

PPTP

C.

L2TP

D.

SMTP

Buy Now
Question # 10

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Technical

B.

Administrative

C.

Automatic

D.

Physical

Buy Now
Question # 11

Which of the following refers to the emulation of the identity of a network computer by an attacking computer?

Options:

A.

Hacking

B.

PING attack

C.

Spoofing

D.

SYN attack

Buy Now
Question # 12

Which of the following statements about IPSec are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses Password Authentication Protocol (PAP) for user authentication.

B.

It uses Encapsulating Security Payload (ESP) for data confidentiality.

C.

It uses Internet Protocol (IP) for data integrity.

D.

It uses Authentication Header (AH) for data integrity.

Buy Now
Question # 13

Which of the following is a link-state routing protocol?

Options:

A.

IGRP

B.

RIP v2

C.

RIP v1

D.

OSPF

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Aug 24, 2025
Questions: 659
GISP pdf

GISP PDF

$25.5  $84.99
GISP Engine

GISP Testing Engine

$28.5  $94.99
GISP PDF + Engine

GISP PDF + Testing Engine

$40.5  $134.99