Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GISP Exam Dumps - GIAC Certification Questions and Answers

Question # 34

Which of the following OSI model layers handles addressing and routing?

Options:

A.

Session

B.

Physical

C.

Network

D.

Application

Buy Now
Question # 35

Which of the following is the default port for Secure Shell (SSH)?

Options:

A.

TCP port 443

B.

UDP port 161

C.

UDP port 138

D.

TCP port 22

Buy Now
Question # 36

Which of the following encryption algorithms are based on stream ciphers?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Twofish

B.

RC4

C.

FISH

D.

Blowfish

Buy Now
Question # 37

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

Options:

A.

The transport layer

B.

The session layer

C.

The application layer

D.

The presentation layer

Buy Now
Question # 38

Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?

Options:

A.

National Institute of Standards and Technology (NIST)

B.

Request for Comments (RFC)

C.

Central Security Service (CSS)

D.

National Security Agency (NSA)

E.

American Bankers Association

F.

International Telecommunications Union

Buy Now
Question # 39

The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from children under __ years of age without verifiable permission of a parent?

Options:

A.

15

B.

13

C.

10

D.

21

E.

18

Buy Now
Question # 40

Which of the following authentication methods support mutual authentication?

Each correct answer represents a complete solution. Choose two.

Options:

A.

MS-CHAP v2

B.

EAP-TLS

C.

EAP-MD5

D.

NTLM

Buy Now
Question # 41

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Building Risk free systems

B.

Risk control

C.

Risk identification

D.

Assuring the integrity of organizational data

Buy Now
Question # 42

Which of the following types of virus is capable of changing its signature to avoid detection?

Options:

A.

Macro virus

B.

Polymorphic virus

C.

Stealth virus

D.

Boot sector virus

Buy Now
Question # 43

Which of the following task force was formed to examine the impact of Electronic Publishing on the intellectual property rights?

Options:

A.

The IIPTF (International Intellectual Property Task Force)

B.

The EPTF (Electronic Publishing Task Force)

C.

The LATF (Langham Act Task Force)

D.

The IITF (Information Infrastructure Task Force)

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Aug 24, 2025
Questions: 659
GISP pdf

GISP PDF

$25.5  $84.99
GISP Engine

GISP Testing Engine

$28.5  $94.99
GISP PDF + Engine

GISP PDF + Testing Engine

$40.5  $134.99