Certbus > GIAC > GIAC Information Security > GISP > GISP Online Practice Questions and Answers

GISP Online Practice Questions and Answers

Questions 4

Which of the following defines the communication link between a Web server and Web applications?

A. PGP

B. CGI

C. IETF

D. Firewall

Browse 659 Q&As
Questions 5

You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this? Each correct answer represents a complete solution. Choose two.

A. Rename the Administrator account.

B. Remove the Administrator account.

C. Disable the Guest account.

D. Enable the Guest account.

Browse 659 Q&As
Questions 6

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

A. Chain of custody

B. Evidence access policy

C. Chain of evidence

D. Incident response policy

Browse 659 Q&As
Questions 7

Which of the following is a signature-based intrusion detection system (IDS) ?

A. StealthWatch

B. Snort

C. RealSecure

D. Tripwire

Browse 659 Q&As
Questions 8

In which of the following processes, a DNS server may return an incorrect IP address, diverting traffic to another computer?

A. TCP FIN scanning

B. DNS poisoning

C. Snooping

D. TCP SYN scanning

Browse 659 Q&As
Questions 9

Which of the following are the major tasks of risk management? Each correct answer represents a complete solution. Choose two.

A. Assuring the integrity of organizational data

B. Building Risk free systems

C. Risk control

D. Risk identification

Browse 659 Q&As
Questions 10

A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.

A. Man-in-the-middle

B. Brute force

C. Denial of Service (DoS)

D. Dictionary

Browse 659 Q&As
Questions 11

Which of the following statements about DES (Data Encryption Standard) is true?

A. Its most widely used symmetric encryption algorithm uses a 56-bit key.

B. Its most widely used symmetric encryption algorithm uses a 32-bit key.

C. Its most widely used symmetric encryption algorithm uses a 128-bit key.

D. Its most widely used symmetric encryption algorithm uses a 64-bit key.

Browse 659 Q&As
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Apr 30, 2024
Questions: 659 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99