Leads4pass > GIAC > GIAC Certifications > GISP > GISP Online Practice Questions and Answers

GISP Online Practice Questions and Answers

Questions 4

Which of the following needs to be documented to preserve evidences for presentation in court?

A. Incident response policy

B. Separation of duties

C. Chain of custody

D. Account lockout policy

Buy Now
Questions 5

Which of the following components come under the physical layer of the OSI model? Each correct answer represents a complete solution. Choose all that apply.

A. Wall jacks

B. Hubs

C. Switches

D. Fiber cabling

E. RJ-45 connectors

Buy Now
Questions 6

Which of the following is a program that monitors data packets traveling across a network?

A. Sniffer

B. Smurf

C. Hacker

D. BitLocker

Buy Now
Questions 7

You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

A. HTTP

B. FTP

C. Firewall

D. Gopher

Buy Now
Questions 8

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

A. FTP server

B. VPN

C. Certificate server

D. Microsoft Internet Information Server (IIS)

Buy Now
Questions 9

Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.

A. RADIUS

B. TACACS+

C. Peer-to-Peer

D. Media Access control

Buy Now
Questions 10

Routers and firewalls use _______ to determine which packets should be forwarded or dropped.

A. Encryption

B. Security audit log

C. Access control list

D. Ciphering

Buy Now
Questions 11

Which of the following terms is used for a router that filters traffic before it is passed to the firewall?

A. Screened host

B. Demilitarized zone (DMZ)

C. Bastion host

D. Honey pot

Buy Now
Questions 12

Which of the following are tunneling protocols?

Each correct answer represents a complete solution. Choose two.

A. SMTP

B. NNTP

C. L2TP

D. PPTP

Buy Now
Questions 13

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

A. Implement a proxy server on the network.

B. Implement firewall on the network.

C. Connect a router to the network.

D. Connect a brouter to the network.

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional (GISP)
Last Update: Jan 11, 2025
Questions: 659
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99