Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GISP Practice Exam with Questions & Answers

Questions 1

Which of the following terms describes an attempt to transfer DNS zone data?

Options:
A.

Reconnaissance

B.

Dumpster diving

C.

Encapsulation

D.

Spam

GIAC GISP Premium Access
Questions 2

Which of the following is a source port forwarder and redirector tool?

Options:
A.

Fpipe

B.

NMAP

C.

SuperScan

D.

NSLOOKUP

Questions 3

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:
A.

The Physical layer

B.

The Network layer

C.

The Data-Link layer

D.

The Presentation layer

Questions 4

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Options:
A.

PGP

B.

TLS

C.

IPSec

D.

S/MIME

Questions 5

In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

Options:
A.

ARP spoofing

B.

Replay

C.

Brute force

D.

MAC duplicating

Questions 6

What are the benefits of using a proxy server on a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

It enhances network security.

B.

It cuts down dial-up charges.

C.

It is used for automated assignment of IP addresses to a TCP/IP client in the domain.

D.

It uses a single registered IP address for multiple connections to the Internet.

Questions 7

Which of the following protocols is used to establish a secure TELNET session over TCP/IP?

Options:
A.

PGP

B.

SSH

C.

SSL

D.

IPSEC

Questions 8

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:
A.

TCP SYN/ACK

B.

IDLE

C.

UDP

D.

RPC

Questions 9

Which of the following refers to a computer that must be secure because it is accessible from the Internet and is vulnerable to attacks?

Options:
A.

LMHOSTS

B.

Bastion host

C.

Firewall

D.

Gateway

Questions 10

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.

Options:
A.

transport

Questions 11

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.

Options:
A.

Blackbox testing

B.

Port redirection

C.

Firewalking

D.

Brainstorming

Questions 12

Which of the following is used by the Diffie-Hellman encryption algorithm?

Options:
A.

Password

B.

Access control entry

C.

Key exchange

D.

Access control list

Questions 13

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:
A.

A-rated

B.

C-rated

C.

B-rated

D.

D-rated

Questions 14

Which of the following protocols is used with a tunneling protocol to provide security?

Options:
A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Questions 15

Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?

Options:
A.

Single Loss Expectancy x Annualized Rate of Occurrence

B.

ALE before implementing safeguard + ALE after implementing safeguard + annual cost of safeguard

C.

ALE before implementing safeguard - ALE after implementing safeguard - annual cost of safeguar

D.

Asset Value x Exposure factor

GIAC Related Exams

How to pass GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test Exam
How to pass GIAC GCFW - GIAC Certified Firewall Analyst Exam
How to pass GIAC GCPM - GIAC Certified Project Manager Certification Practice Test Exam
How to pass GIAC GISF - GIAC Information Security Fundamentals Exam
How to pass GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET Exam
How to pass GIAC GSSP-Java - GIAC Secure Software Programmer – Java Exam
How to pass GIAC GSSP-NET-CSHARP - GIAC GIAC Secure Software Programmer - C#.NET Exam

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.