Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GISP Exam Dumps - GIAC Certification Questions and Answers

Question # 24

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against

__________.

Options:

A.

SNMP enumeration

B.

DNS zone transfer

C.

IIS buffer overflow

D.

NetBIOS NULL session

Buy Now
Question # 25

Which of the following statements about the bridge are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It filters traffic based on IP addresses.

B.

It forwards broadcast packets.

C.

It assigns a different network address per port.

D.

It filters traffic based on MAC addresses.

Buy Now
Question # 26

Fill in the blanks with the appropriate values.

International Data Encryption Algorithm (IDEA) is a _____ -bit block cipher that uses a ________-bit key.

Options:

A.

64,128

Buy Now
Question # 27

Which of the following refers to a program that allows access to a system by skipping the security checks?

Options:

A.

Honey pot

B.

Hoax

C.

Back door

D.

Worm

Buy Now
Question # 28

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Collusion

B.

Eavesdropping

C.

Buffer overflow

D.

Phishing

Buy Now
Question # 29

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For monitoring unauthorized zone transfer

B.

For preventing malware attacks on a DNS server

C.

For recording the number of queries resolved

D.

For measuring a DNS server's performance

Buy Now
Question # 30

Identify whether the given statement is true or false.

"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

Options:

A.

False

B.

True

Buy Now
Question # 31

Which of the following should propose applicable and effective security controls for managing the risks?

Options:

A.

Risk assessment

B.

Risk treatment plan

C.

Risk communication

D.

Risk management plan

Buy Now
Question # 32

Which of the following refers to encrypted text?

Options:

A.

Plaintext

B.

Cookies

C.

Hypertext

D.

Ciphertext

Buy Now
Question # 33

Mark works as a Network Administrator for We-are-secure Inc. He finds that the We-are-secure server has been infected with a virus. He presents to the company a report that describes the symptoms of the virus. A summary of the report is given below:

This virus has a dual payload, as the first payload of the virus changes the first megabyte of the hard drive to zero. Due to this, the contents of the partition tables are deleted and the computer hangs. The second payload replaces the code of the flash BIOS with garbage values. This virus spreads under the Portable Executable File Format under Windows 95, Windows 98, and Windows ME.

Which of the following viruses has the symptoms as the one described above?

Options:

A.

Nimda

B.

Chernobyl

C.

Melissa

D.

I Love You

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Aug 24, 2025
Questions: 659
GISP pdf

GISP PDF

$25.5  $84.99
GISP Engine

GISP Testing Engine

$28.5  $94.99
GISP PDF + Engine

GISP PDF + Testing Engine

$40.5  $134.99