GIAC GISP - GIAC Information Security Professional Exam

Page:    1 / 132   
Total 659 questions

Which of the following is a technique used to attack an Ethernet wired or wireless network?

  • A. DNS poisoning
  • B. Keystroke logging
  • C. Mail bombing
  • D. ARP poisoning


Answer : D

Which of the following refers to encrypted text?

  • A. Plaintext
  • B. Cookies
  • C. Hypertext
  • D. Ciphertext


Answer : D

Which of the following are the benefits of information classification for an organization?

  • A. It helps identify which information is the most sensitive or vital to an organization.
  • B. It ensures that modifications are not made to data by unauthorized personnel or processes.
  • C. It helps identify which protections apply to which information.
  • D. It helps reduce the Total Cost of Ownership (TCO).


Answer : A,C

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

  • A. Role-Based Access Control
  • B. Discretionary Access Control
  • C. Mandatory Access Control
  • D. Policy Access Control


Answer : A

Which of the following are methods used for authentication?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Smart card
  • B. Biometrics
  • C. Username and password
  • D. Magnetic stripe card


Answer : A,B,C,D

Page:    1 / 132   
Total 659 questions