Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GISP Exam Dumps - GIAC Certification Questions and Answers

Question # 14

Which of the following categories of UTP cable has maximum data transfer rate of 155 Mbps?

Options:

A.

Category 5

B.

Category 3

C.

Category 7

D.

Category 6

Buy Now
Question # 15

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-inthe- middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the Weare- secure server?

Options:

A.

RSA

B.

Diffie-Hellman

C.

Twofish

D.

Blowfish

Buy Now
Question # 16

Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?

Options:

A.

Dictionary attack

B.

DDoS attack

C.

Insertion attack

D.

Evasion attack

Buy Now
Question # 17

Which of the following types of attacks occurs when attackers enter a system or capture network traffic and make changes to selected files or data packets?

Options:

A.

Brute force attack

B.

Teardrop attack

C.

Dictionary attack

D.

Data diddling attack

Buy Now
Question # 18

Which of the following is not a level of military data-classification system?

Options:

A.

Unclassified

B.

Normal

C.

Confidential

D.

Top secret

Buy Now
Question # 19

Which of the following statements best explains how encryption works on the Internet?

Options:

A.

Encryption encodes information using specific algorithms with a string of numbers known as a key

B.

Encryption helps in transaction processing by e-commerce servers on the Internet.

C.

Encryption validates a username and password before sending information to the Web server.

D.

Encryption allows authorized users to access Web sites that offer online shopping.

Buy Now
Question # 20

You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Rename the Administrator account.

B.

Remove the Administrator account.

C.

Disable the Guest account.

D.

Enable the Guest account.

Buy Now
Question # 21

Which of the following layers are the sub layers of the data-link layer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Media Access Control (MAC)

B.

Logical Link Control (LLC)

C.

Reserve Address Resolution Protocol (RARP)

D.

Serial Line Internet Protocol (SLIP)

Buy Now
Question # 22

Which of the following books deals with confidentiality?

Options:

A.

Brown Book

B.

Red Book

C.

Purple Book

D.

Orange Book

Buy Now
Question # 23

Which of the following uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients?

Options:

A.

SSL

B.

TLS

C.

PGP

D.

EAP

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Aug 24, 2025
Questions: 659
GISP pdf

GISP PDF

$25.5  $84.99
GISP Engine

GISP Testing Engine

$28.5  $94.99
GISP PDF + Engine

GISP PDF + Testing Engine

$40.5  $134.99