GIAC GISP - GIAC Information Security Professional Exam

Question #1 (Topic: Topic 1)
Which of the following is a technique used to attack an Ethernet wired or wireless network?
A. DNS poisoning B. Keystroke logging C. Mail bombing D. ARP poisoning
Answer: D
Question #2 (Topic: Topic 1)
Which of the following refers to encrypted text?
A. Plaintext B. Cookies C. Hypertext D. Ciphertext
Answer: D
Question #3 (Topic: Topic 1)
Which of the following are the benefits of information classification for an organization?
A. It helps identify which information is the most sensitive or vital to an organization. B. It ensures that modifications are not made to data by unauthorized personnel or processes. C. It helps identify which protections apply to which information. D. It helps reduce the Total Cost of Ownership (TCO).
Answer: A,C
Question #4 (Topic: Topic 1)
Mark works as a Network Administrator for NetTech Inc. He wants users to access only
those resources that are required for them. Which of the following access control models
will he use?
A. Role-Based Access Control B. Discretionary Access Control C. Mandatory Access Control D. Policy Access Control
Answer: A
Question #5 (Topic: Topic 1)
Which of the following are methods used for authentication?
Each correct answer represents a complete solution. Choose all that apply.
A. Smart card B. Biometrics C. Username and password D. Magnetic stripe card
Answer: A,B,C,D
Download Exam
Page: 1 / 132
Total 659 questions