Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GISP Exam Dumps - GIAC Certification Questions and Answers

Question # 54

In which of the following processes, a DNS server may return an incorrect IP address, diverting traffic to another computer?

Options:

A.

TCP FIN scanning

B.

DNS poisoning

C.

Snooping

D.

TCP SYN scanning

Buy Now
Question # 55

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.

Backup policy

B.

Network security policy

C.

User password policy

D.

Privacy policy

Buy Now
Question # 56

Which of the following attacks involves multiple compromised systems to attack a single target?

Options:

A.

Brute force attack

B.

DDoS attack

C.

Dictionary attack

D.

Replay attack

Buy Now
Question # 57

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. While examining a log report, he finds that an intrusion has been attempted by an attacker whose IP address is 0x40.0x3A.0x2B.0xE6. Which of the following decimal IP addresses will respond to the ping on the above Hexadecimal IP address?

Options:

A.

64.58.42.230

B.

64.59.43.230

C.

64.58.43.231

D.

64.58.43.230

Buy Now
Question # 58

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Snort

B.

SARA

C.

Samhain

D.

Tripwire

Buy Now
Question # 59

Which of the following hashing algorithms produces a variable length hash value?

Options:

A.

MD5

B.

SHA

C.

HAVAL

D.

MD4

Buy Now
Question # 60

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?

Options:

A.

Web caching

B.

Hacking

C.

Packet filtering

D.

Spoofing

Buy Now
Question # 61

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Secret

B.

Asymmetric

C.

Synchronous

D.

Symmetric

Buy Now
Question # 62

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

PING

B.

IPCONFIG

C.

TRACERT

D.

NSLOOKUP

Buy Now
Question # 63

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Eavesdropping

B.

Dumpster diving

C.

Placing a backdoor

D.

Shoulder surfing

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Aug 24, 2025
Questions: 659
GISP pdf

GISP PDF

$25.5  $84.99
GISP Engine

GISP Testing Engine

$28.5  $94.99
GISP PDF + Engine

GISP PDF + Testing Engine

$40.5  $134.99