Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GISP Exam Dumps - GIAC Certification Questions and Answers

Question # 74

Which of the following types of evidence is considered as the best evidence?

Options:

A.

A copy of the original document

B.

A computer-generated record

C.

Information gathered through the witness's senses

D.

The original document

Buy Now
Question # 75

Which of the following statements about Public Key Infrastructure (PKI) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses symmetric key pairs.

B.

It uses asymmetric key pairs.

C.

It provides security using data encryption and digital signature.

D.

It is a digital representation of information that identifies users.

Buy Now
Question # 76

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Knowledge-based detection

B.

Statistical anomaly detection

C.

Pattern matching detection

D.

Protocol detection

Buy Now
Question # 77

An attacker sends a large number of packets to a target computer that causes denial of service. Which of the following type of attacks is this?

Options:

A.

Flooding

B.

Snooping

C.

Phishing

D.

Spoofing

Buy Now
Question # 78

Which of the following statements about DMZ are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is an anti-virus software that scans the incoming traffic on an internal network.

B.

It is the boundary between the Internet and a private network.

C.

It contains company resources that are available on the Internet, such as Web servers and FTP servers.

D.

It contains an access control list (ACL).

Buy Now
Question # 79

Which of the following statements about Switched Multimegabit Data Service (SMDS) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a logical connection between two devices.

B.

It uses fixed-length (53-byte) packets to transmit information.

C.

It supports speeds of 1.544 Mbps over Digital Signal level 1 (DS-1) transmission facilities.

D.

It is a high-speed WAN networking technology used for communication over public data networks

Buy Now
Question # 80

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Password-based authentication

B.

Rhosts (rsh-style) authentication

C.

TIS authentication

D.

Kerberos authentication

Buy Now
Question # 81

Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?

Options:

A.

Type II

B.

Type I

C.

Type III

D.

Type IV

Buy Now
Question # 82

Which of the following statements about a bastion host is true?

Options:

A.

It is a computer that is used to resolve the NetBIOS name to an IP address.

B.

It is a computer that is used to resolve the host name to an IP address.

C.

It is a computer that is accessible from the Internet to collect information about internal networks.

D.

It is a computer that must be made secure because it is accessible from the Internet and hence is more vulnerable to attacks.

Buy Now
Question # 83

Which of the following processes is known as Declassification?

Options:

A.

Verifying the identity of a person, network host, or system process.

B.

Physically destroying the media and the information stored on it.

C.

Assessing the risk involved in making a confidential document available to public.

D.

Removing the content from the media so that it is difficult to restore.

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Aug 24, 2025
Questions: 659
GISP pdf

GISP PDF

$25.5  $84.99
GISP Engine

GISP Testing Engine

$28.5  $94.99
GISP PDF + Engine

GISP PDF + Testing Engine

$40.5  $134.99