giac gisp practice test

Exam Title: GIAC Information Security Professional

Last update: Nov 27 ,2025
Question 1

Which of the following statements about a fiber-optic cable are true?
Each correct answer represents a complete solution. Choose three.

  • A. It is immune to electromagnetic interference (EMI).
  • B. It can transmit undistorted signals over great distances.
  • C. It has eight wires twisted into four pairs.
  • D. It uses light pulses for signal transmission.
Answer:

A,B,D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

Which of the following statements about the bridge are true?
Each correct answer represents a complete solution. Choose two.

  • A. It filters traffic based on IP addresses.
  • B. It forwards broadcast packets.
  • C. It assigns a different network address per port.
  • D. It filters traffic based on MAC addresses.
Answer:

B,D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web
browser receives information and downloads content from Web sites. Which of the following
browser settings will Sam use to accomplish this?

  • A. Proxy server
  • B. Security
  • C. Cookies
  • D. Certificate
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

Which of the following are used to suppress paper or wood fires?
Each correct answer represents a complete solution. Choose two.

  • A. Water
  • B. Kerosene
  • C. CO2
  • D. Soda acid
Answer:

A,D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

Which of the following steps can be taken to protect laptops and data they hold?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Use slot locks with cable to connect the laptop to a stationary object.
  • B. Keep inventory of all laptops including serial numbers.
  • C. Harden the operating system.
  • D. Encrypt all sensitive data.
Answer:

A,B,C,D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

Which of the following attacks involves multiple compromised systems to attack a single target?

  • A. Brute force attack
  • B. DDoS attack
  • C. Dictionary attack
  • D. Replay attack
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

Which of the following statements about DMZ are true?
Each correct answer represents a complete solution. Choose two.

  • A. It is an anti-virus software that scans the incoming traffic on an internal network.
  • B. It is the boundary between the Internet and a private network.
  • C. It contains company resources that are available on the Internet, such as Web servers and FTP servers.
  • D. It contains an access control list (ACL).
Answer:

B,C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Which of the following protocols is used to establish a secure TELNET session over TCP/IP?

  • A. SSL
  • B. PGP
  • C. IPSEC
  • D. SSH
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

Which methods help you to recover your data in the event of a system or hard disk failure?
Each correct answer represents a complete solution. Choose two.

  • A. Install a RAID system
  • B. Use data encryption
  • C. Install and use a tape backup unit
  • D. Install UPS systems on all important devices
Answer:

A,C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is
known as __________.

  • A. False positive
  • B. False negative
  • C. True negative
  • D. True positive
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 66
Viewing questions 1-10 out of 667
Go To
page 2