Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

GISP GIAC Information Security Professional Questions and Answers

Questions 4

Which of the following are used to suppress gasoline and oil fires?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Water

B.

CO2

C.

Halon

D.

Soda acid

Buy Now
Questions 5

Which of the following are the differences between PPTP and L2TP?

Each correct answer represents a complete solution. Choose three.

Options:

A.

L2TP does not provide any kind of security.

B.

PPTP connections use Microsoft Point-to-Point Encryption (MPPE), whereas L2TP uses Data Encryption Standard (DES).

C.

L2TP may be used with IPSec, while PPTP stands alone.

D.

PPTP is supported by most industry vendors, while L2TP is a proprietary Microsoft standard.

Buy Now
Questions 6

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

Options:

A.

Take a full backup daily and use six-tape rotation.

B.

Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.

C.

Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.

D.

Take a full backup daily with the previous night's tape taken offsite.

E.

Take a full backup daily with one tape taken offsite weekly.

F.

Take a full backup on alternate days and keep rotating the tapes.

Buy Now
Questions 7

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

HTTP

B.

SSL

C.

SNMP

D.

TLS

Buy Now
Questions 8

Which of the following steps can be taken to protect laptops and data they hold?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use slot locks with cable to connect the laptop to a stationary object.

B.

Keep inventory of all laptops including serial numbers.

C.

Harden the operating system.

D.

Encrypt all sensitive data.

Buy Now
Questions 9

Which of the following terms refers to the protection of data against unauthorized access?

Options:

A.

Auditing

B.

Recovery

C.

Confidentiality

D.

Integrity

Buy Now
Questions 10

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:

A.

B-rated

B.

A-rated

C.

D-rated

D.

C-rated

Buy Now
Questions 11

Which of the following components come under the network layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Firewalls

B.

Hub

C.

Routers

D.

MAC addresses

Buy Now
Questions 12

Which of the following protocols implements VPN using IPSec?

Options:

A.

PPP

B.

L2TP

C.

PPTP

D.

SLIP

Buy Now
Questions 13

A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.

Options:

A.

Man-in-the-middle

B.

Brute force

C.

Denial of Service (DoS)

D.

Dictionary

Buy Now
Questions 14

Which of the following is an attack with IP fragments that cannot be reassembled?

Options:

A.

Teardrop attack

B.

Dictionary attack

C.

Password guessing attack

D.

Smurf attack

Buy Now
Questions 15

The TCP/IP protocol suite uses ____ to identify which service a certain packet is destined for.

Options:

A.

MAC addresses

B.

Port numbers

C.

Subnet masks

D.

IP addresses

Buy Now
Questions 16

The _______ protocol allows applications to communicate across a network in a way designed to prevent eavesdropping and message forgery.

Options:

A.

PPP

B.

TCP

C.

EAP

D.

TLS

Buy Now
Questions 17

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

Options:

A.

Piggybacking

B.

Hacking

C.

Session hijacking

D.

Keystroke logging

Buy Now
Questions 18

Which of the following terms is used for a router that filters traffic before it is passed to the firewall?

Options:

A.

Honey pot

B.

Bastion host

C.

Demilitarized zone (DMZ)

D.

Screened host

Buy Now
Questions 19

Which of the following layers of the OSI model provides end-to-end service?

Options:

A.

The physical layer

B.

The application layer

C.

The session layer

D.

The transport layer

Buy Now
Questions 20

Which of the following statements about a smart card are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is used to securely store public and private keys for log on , e-mail signing and encryption, and file encryption.

B.

It is a device that routes data packets between computers in different networks.

C.

It is a device that contains a microprocessor and permanent memory.

D.

It is a device that works as an interface between a computer and a network.

Buy Now
Questions 21

Which of the following attacks is specially used for cracking a password?

Options:

A.

DoS attack

B.

PING attack

C.

Dictionary attack

D.

Vulnerability attack

Buy Now
Questions 22

Which of the following statements about Network Address Translation (NAT) is true?

Options:

A.

It hides the public network from internal hosts.

B.

It hides internal hosts from the public network.

C.

It uses public IP addresses on an internal network.

D.

It translates IP addresses into user friendly names.

Buy Now
Questions 23

Which of the following classes of fire comes under Class C fire?

Options:

A.

Combustible metals fire

B.

Paper or wood fire

C.

Oil fire

D.

Electronic or computer fire

Buy Now
Questions 24

In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?

Options:

A.

Remote dial-up network

B.

Remote network

C.

Stolen equipment

D.

Local network

Buy Now
Questions 25

Which of the following is a process of monitoring data packets that travel across a network?

Options:

A.

Packet sniffing

B.

Packet filtering

C.

Shielding

D.

Password guessing

Buy Now
Questions 26

Which of the following components come under the physical layer of the OSI model?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Wall jacks

B.

Hubs

C.

Switches

D.

Fiber cabling

E.

RJ-45 connectors

Buy Now
Questions 27

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser 's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?

Options:

A.

The site's Web server has heavy traffic.

B.

WINS server has no NetBIOS name entry for the server.

C.

DNS entry is not available for the host name.

D.

The site's Web server is offline.

Buy Now
Questions 28

You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?

Options:

A.

Disable DNS recursive queries on the DNS server.

B.

Enable DNS recursive queries on the DNS server.

C.

Enable DNS reverse lookup on the e-mail server.

D.

Disable DNS reverse lookup on the e-mail server.

Buy Now
Questions 29

Which of the following terms refers to the act of obtaining plain text from cipher text without a cryptographic key?

Options:

A.

Hacking

B.

Algorithm

C.

Cryptanalysis

D.

Ciphertext

Buy Now
Questions 30

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Data service

B.

Account service

C.

Authentication service

D.

Ticket-granting service

Buy Now
Questions 31

Which of the following tabs will you click in the Internet Options dialog box to include a websites as a trusted site?

Options:

A.

Security

B.

Privacy

C.

Content

D.

General

Buy Now
Questions 32

Mark the list that mentions the correct levels of classification of the military data-classification system.

Options:

A.

未命名-4

Buy Now
Questions 33

Which of the following access control models are used in the commercial sector?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Clark-Wilson model

B.

Clark-Biba model

C.

Bell-LaPadula model

D.

Biba model

Buy Now
Questions 34

Which of the following are used to suppress paper or wood fires?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Water

B.

Kerosene

C.

CO2

D.

Soda acid

Buy Now
Questions 35

Which of the following protocols is used as the directory access protocol?

Options:

A.

HDAP

B.

NNTP

C.

FTP

D.

LDAP

Buy Now
Questions 36

Which of the following hardware devices prevents broadcasts from crossing over subnets?

Options:

A.

Bridge

B.

Router

C.

Modem

D.

Hub

Buy Now
Questions 37

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

Options:

A.

Biometrics

B.

Anonymous

C.

Mutual

D.

Multi-factor

Buy Now
Questions 38

Which of the following types of safes can be chosen by an organization to store data backups or other types of valuables?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Depositaries

B.

Chests

C.

Bottle safe

D.

Wall safe

Buy Now
Questions 39

Which of the following OSI model layers handles addressing and routing?

Options:

A.

Session

B.

Physical

C.

Network

D.

Application

Buy Now
Questions 40

Which of the following statements about System Access Control List (SACL) is true?

Options:

A.

It exists for each and every permission entry assigned to any object.

B.

It is a mechanism for reducing the need for globally unique IP addresses.

C.

It contains a list of both users and groups and whatever permissions they have.

D.

It contains a list of any events that are set to audit for that particular object.

Buy Now
Questions 41

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

Options:

A.

RAID-5

B.

RAID-0

C.

RAID-4

D.

RAID-3

E.

RAID-1

Buy Now
Questions 42

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.

B.

It uses TCP port 80 as the default port.

C.

It uses TCP port 443 as the default port.

D.

It is a protocol used to provide security for a database server in an internal network.

Buy Now
Questions 43

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:

•It displays the signal strength of a wireless network, MAC address, SISD, channel details, etc.

•It is commonly used for the following purposes:

a. War driving

b. Detecting unauthorized access points

c. Detecting causes of interference on a WLAN

d. WEP ICV error tracking

e. Making Graphs and Alarms on 802.11 Data, including Signal Strength

This tool is known as __________.

Options:

A.

Kismet

B.

NetStumbler

C.

Absinthe

D.

THC-Scan

Buy Now
Questions 44

Which of the following layers are the sub layers of the data-link layer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Media Access Control (MAC)

B.

Logical Link Control (LLC)

C.

Reserve Address Resolution Protocol (RARP)

D.

Serial Line Internet Protocol (SLIP)

Buy Now
Questions 45

John works as a C programmer. He develops the following C program:

#include

#include

#include

int buffer(char *str) {

char buffer1[10];

strcpy(buffer1, str);

return 1;

}

int main(int argc, char *argv[]) {

buffer (argv[1]);

printf("Executed\n");

return 1;

}

His program is vulnerable to a __________ attack.

Options:

A.

Denial-of-Service

B.

SQL injection

C.

Buffer overflow

D.

Cross site scripting

Buy Now
Questions 46

Which of the following access control models uses a predefined set of access privileges for an object of a system?

Options:

A.

Policy Access Control

B.

Mandatory Access Control

C.

Role-Based Access Control

D.

Discretionary Access Control

Buy Now
Questions 47

Which of the following protocols work at the Session layer of the OSI model?

Options:

A.

User Datagram Protocol (UDP)

B.

Trivial File Transfer Protocol (TFTP)

C.

Border Gateway Multicast Protocol (BGMP)

D.

Internet Security Association and Key Management Protocol (ISAKMP)

Buy Now
Questions 48

Which of the following tools can be used by a user to hide his identity?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

War dialer

B.

IPchains

C.

Anonymizer

D.

Proxy server

E.

Rootkit

Buy Now
Questions 49

Which of the following is a documentation of guidelines that are used to create archival copies of important data?

Options:

A.

Backup policy

B.

Security policy

C.

User policy

D.

Audit policy

Buy Now
Questions 50

Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SocketShield

B.

Enum

C.

KFSensor

D.

Sheep dip

Buy Now
Questions 51

Which of the following handles a relatively wide range of frequencies, which may be divided into channels or frequency bins?

Options:

A.

Broadband transmission

B.

Multicast transmission

C.

Baseband transmission

D.

Unicast transmission

Buy Now
Questions 52

Which of the following security models dictates that subjects can only access objects through applications?

Options:

A.

Biba-Clark model

B.

Bell-LaPadula

C.

Biba model

D.

Clark-Wilson

Buy Now
Questions 53

Which of the following is used by attackers to obtain an authenticated connection on a network?

Options:

A.

Denial-of-Service (DoS) attack

B.

Replay attack

C.

Man-in-the-middle attack

D.

Back door

Buy Now
Questions 54

On which of the following OSI model layers does IPSec operate?

Options:

A.

Data-link layer

B.

Physical layer

C.

Session layer

D.

Network layer

Buy Now
Questions 55

Which of the following are the responsibilities of a custodian with regard to data in an information classification program?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Running regular backups and routinely testing the validity of the backup data

B.

Performing data restoration from the backups when necessary

C.

Controlling access, adding and removing privileges for individual users

D.

Determining what level of classification the information requires

Buy Now
Questions 56

Which of the following statements about asymmetric encryption are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Asymmetric encryption uses a public key and a private key pair for data encryption.

B.

Asymmetric encryption is faster as compared to symmetric encryption.

C.

In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.

D.

In asymmetric encryption, only one key is needed to encrypt and decrypt data.

Buy Now
Questions 57

Which of the following protocols implements VPN using IPSec?

Options:

A.

L2TP

B.

SLIP

C.

PPP

D.

PPTP

Buy Now
Questions 58

Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Integrity

B.

Privacy

C.

Confidentiality

D.

Availability

Buy Now
Questions 59

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

Options:

A.

21

B.

443

C.

80

D.

22

Buy Now
Questions 60

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Knowledge-based detection

B.

Statistical anomaly detection

C.

Pattern matching detection

D.

Protocol detection

Buy Now
Questions 61

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

Options:

A.

TCP port 110

B.

UDP port 161

C.

UDP port 1701

D.

TCP port 443

Buy Now
Questions 62

You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?

Options:

A.

Enable DNS recursive queries on the DNS server.

B.

Disable DNS reverse lookup on the e-mail server.

C.

Enable DNS reverse lookup on the e-mail server.

D.

Disable DNS recursive queries on the DNS server.

Buy Now
Questions 63

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

PING

B.

IPCONFIG

C.

TRACERT

D.

NSLOOKUP

Buy Now
Questions 64

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Data service

B.

Account service

C.

Authentication service

D.

Ticket-granting service

Buy Now
Questions 65

Which of the following protocols implements VPN using IPSec?

Options:

A.

L2TP

B.

SLIP

C.

PPP

D.

PPTP

Buy Now
Questions 66

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

He should upgrade his antivirus program.

B.

He should restore his Windows settings.

C.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

Buy Now
Questions 67

Which of the following are examples of passive attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Eavesdropping

B.

Dumpster diving

C.

Placing a backdoor

D.

Shoulder surfing

Buy Now
Questions 68

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Password-based authentication

B.

Kerberos authentication

C.

TIS authentication

D.

Rhosts (rsh-style) authentication

Buy Now
Questions 69

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.

Backup policy

B.

Network security policy

C.

User password policy

D.

Privacy policy

Buy Now
Questions 70

Which of the following access control models requires centralize database of user accounts?

Options:

A.

User based

B.

Data based

C.

Group based

D.

Partitions based

Buy Now
Questions 71

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

Options:

A.

Spoofing

B.

Auditing

C.

Shielding

D.

System hardening

Buy Now
Questions 72

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Options:

A.

PGP

B.

Symmetric

C.

S/MIME

D.

Asymmetric

Buy Now
Questions 73

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Options:

A.

Tunneling

B.

Spoofing

C.

Packet filtering

D.

Packet sniffing

Buy Now
Questions 74

Which of the following ports is used by the control connection on the FTP server?

Options:

A.

TCP port 23

B.

TCP port 21

C.

TCP port 53

D.

TCP port 443

Buy Now
Questions 75

Which of the following types of virus is capable of changing its signature to avoid detection?

Options:

A.

Macro virus

B.

Polymorphic virus

C.

Stealth virus

D.

Boot sector virus

Buy Now
Questions 76

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Buffer overflow

B.

Collusion

C.

Phishing

D.

Eavesdropping

Buy Now
Questions 77

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

Options:

A.

Rootkit

B.

Backdoor

C.

Access control list

D.

Rainbow table

Buy Now
Questions 78

Which of the following statements best describes VeriSign?

Options:

A.

It is an authentication server.

B.

It is a certification authority.

C.

It is an encryption technology.

D.

It is a signature verification utility.

Buy Now
Questions 79

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For monitoring unauthorized zone transfer

B.

For preventing malware attacks on a DNS server

C.

For recording the number of queries resolved

D.

For measuring a DNS server's performance

Buy Now
Questions 80

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

Options:

A.

Cryptanalysis

B.

Kerberos

C.

Cryptographer

D.

Cryptography

Buy Now
Questions 81

What are packet sniffers?

Options:

A.

Packet sniffers test package security.

B.

Packet sniffers capture the packages as they cross the network.

C.

Packet sniffers encrypt the packages as they cross the network.

D.

Packet sniffers test the packages to verify data integrity.

Buy Now
Questions 82

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Corroborating

B.

Circumstantial

C.

Direct

D.

Incontrovertible

Buy Now
Questions 83

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance

B.

Dumpster diving

C.

Encapsulation

D.

Spam

Buy Now
Questions 84

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

Options:

A.

Bridge

B.

Antivirus software

C.

Gateway

D.

Firewall

Buy Now
Questions 85

Which of the following is not a level of military data-classification system?

Options:

A.

Unclassified

B.

Normal

C.

Confidential

D.

Top secret

Buy Now
Questions 86

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Collusion

B.

Eavesdropping

C.

Phishing

D.

Buffer overflow

Buy Now
Questions 87

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Building Risk free systems

B.

Risk control

C.

Risk identification

D.

Assuring the integrity of organizational data

Buy Now
Questions 88

Which of the following processes is known as sanitization?

Options:

A.

Physically destroying the media and the information stored on it.

B.

Assessing the risk involved in discarding particular information.

C.

Verifying the identity of a person, network host, or system process.

D.

Removing the content from the media so that it is difficult to restore.

Buy Now
Questions 89

Which of the following is the best way of protecting important data against virus attack?

Options:

A.

Updating the anti-virus software regularly.

B.

Taking daily backup of data.

C.

Using strong passwords to log on to the network.

D.

Implementing a firewall.

Buy Now
Questions 90

Which of the following access control models uses a role based method to determine access rights and permission?

Options:

A.

Discretionary access control

B.

Roaming access control

C.

Nondiscretionary access control

D.

Mandatory access control

Buy Now
Questions 91

Which of the following statements about smurf is true?

Options:

A.

It is an ICMP attack that involves spoofing and flooding.

B.

It is a UDP attack that involves spoofing and flooding.

C.

It is a denial of service (DoS) attack that leaves TCP ports open.

D.

It is an attack with IP fragments that cannot be reassembled.

Buy Now
Questions 92

Which of the following are threats to network security?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Dial-up connections

B.

Rogue employees

C.

Disabled user accounts

D.

Events auditing

Buy Now
Questions 93

Which of the following is an asymmetric encryption algorithm?

Options:

A.

RC5

B.

Diffie-Hellman

C.

RC4

D.

Blowfish

Buy Now
Questions 94

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against

__________.

Options:

A.

SNMP enumeration

B.

DNS zone transfer

C.

IIS buffer overflow

D.

NetBIOS NULL session

Buy Now
Questions 95

A ________ is a detailed step-by-step document that explains exactly what is to be done.

Options:

A.

Procedure

B.

Baseline

C.

Standard

D.

Rule

Buy Now
Questions 96

Which authentication method uses retinal scanners for authentication process?

Options:

A.

Biometrics

B.

Challenge Handshake Authentication Protocol (CHAP)

C.

Smart cards

D.

Kerberos

E.

Certifications

F.

Multi-factor

Buy Now
Questions 97

Fill in the blank with the appropriate layer name.

The Network layer of the OSI model corresponds to the _______________ layer of the TCP/IP model.

Options:

A.

Internet

Buy Now
Questions 98

Which of the following is used to allow or deny access to network resources?

Options:

A.

ACL

B.

System hardening

C.

Spoofing

D.

NFS

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Aug 14, 2025
Questions: 659

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now GISP testing engine

PDF (Q&A)

$36.75  $104.99
buy now GISP pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 18 Aug 2025