Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GISP Exam Dumps - GIAC Certification Questions and Answers

Question # 84

Which of the following is used by attackers to obtain an authenticated connection on a network?

Options:

A.

Denial-of-Service (DoS) attack

B.

Replay attack

C.

Man-in-the-middle attack

D.

Back door

Buy Now
Question # 85

You work as a Web Administrator for Perfect World Inc. The company is planning to host an Ecommerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Use the EAP protocol.

B.

Use the SSL protocol.

C.

Use Basic authentication.

D.

Use encrypted authentication.

Buy Now
Question # 86

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Data service

B.

Account service

C.

Authentication service

D.

Ticket-granting service

Buy Now
Question # 87

Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?

Options:

A.

LMHOSTS

B.

Bastion host

C.

Firewall

D.

Gateway

Buy Now
Question # 88

Which of the following statements about Dynamic Host Configuration Protocol (DHCP) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is used to provide host name resolution in a TCP/IP-based network.

B.

It is used to dynamically assign IP addresses to computers.

C.

It reduces the complexity of managing network client IP address configuration.

D.

It reduces the risk of a denial of service (DoS) attack.

Buy Now
Question # 89

Fill in the blank with the appropriate value.

Twofish symmetric key block cipher operates on 128-bits block size using key sizes up to______ bits.

Options:

A.

256

Buy Now
Question # 90

Which of the following security models dictates that subjects can only access objects through applications?

Options:

A.

Biba-Clark model

B.

Bell-LaPadula

C.

Biba model

D.

Clark-Wilson

Buy Now
Question # 91

Which of the following IP addresses are private addresses?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

10.0.0.3

B.

192.168.15.2

C.

192.166.54.32

D.

19.3.22.17

Buy Now
Question # 92

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Physical layer

B.

The Network layer

C.

The Data-Link layer

D.

The Presentation layer

Buy Now
Question # 93

Which of the following is a technique used to attack an Ethernet wired or wireless network?

Options:

A.

DNS poisoning

B.

Keystroke logging

C.

Mail bombing

D.

ARP poisoning

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Aug 24, 2025
Questions: 659
GISP pdf

GISP PDF

$25.5  $84.99
GISP Engine

GISP Testing Engine

$28.5  $94.99
GISP PDF + Engine

GISP PDF + Testing Engine

$40.5  $134.99