GIAC GISP Exam Practice Questions (P. 1)
- Full Access (654 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
Which of the following is a technique used to attack an Ethernet wired or wireless network?
send
light_mode
delete
Question #2
Which of the following refers to encrypted text?
send
light_mode
delete
Question #3
Which of the following are the benefits of information classification for an organization?
- AIt helps identify which information is the most sensitive or vital to an organization.
- BIt ensures that modifications are not made to data by unauthorized personnel or processes.
- CIt helps identify which protections apply to which information.
- DIt helps reduce the Total Cost of Ownership (TCO).
Correct Answer:
AC
AC
send
light_mode
delete
Question #4
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?
- ARole-Based Access Control
- BDiscretionary Access Control
- CMandatory Access Control
- DPolicy Access Control
Correct Answer:
A
A
send
light_mode
delete
Question #5
Which of the following are methods used for authentication?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
- ASmart card
- BBiometrics
- CUsername and password
- DMagnetic stripe card
Correct Answer:
ABCD
ABCD
send
light_mode
delete
Question #6
Which of the following protocols is used to verify the status of a certificate?
send
light_mode
delete
Question #7
SIMULATION -
Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.
Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.
send
light_mode
delete
Question #8
You work as a Network Administrator for NetTech Inc. The company has a network that consists of 200 client computers and ten database servers. One morning, you find that a hacker is accessing unauthorized data on a database server on the network. Which of the following actions will you take to preserve the evidences?
Each correct answer represents a complete solution. Choose three.
Each correct answer represents a complete solution. Choose three.
- APrevent a forensics experts team from entering the server room.
- BPreserve the log files for a forensics expert.
- CPrevent the company employees from entering the server room.
- DDetach the network cable from the database server.
Correct Answer:
BCD
BCD
send
light_mode
delete
Question #9
Which of the following heights of fence deters only casual trespassers?
send
light_mode
delete
Question #10
model is true?
- AIn this model, a user can access resources according to his role in the organization.
- BIn this model, the permissions are uniquely assigned to each user account.
- CIn this model, the same permission is assigned to each user account.
- DIn this model, the users can access resources according to their seniority.
Correct Answer:
A
A
send
light_mode
delete
All Pages