Pass4itsure > GIAC > GIAC Information Security > GISP > GISP Online Practice Questions and Answers

GISP Online Practice Questions and Answers

Questions 4

Which of the following statements about role-based access control (RBAC) model is true?

A. In this model, a user can access resources according to his role in the organization.

B. In this model, the permissions are uniquely assigned to each user account.

C. In this model, the same permission is assigned to each user account.

D. In this model, the users can access resources according to their seniority.

Buy Now
Questions 5

Which of the following protocols work at the data-link layer? Each correct answer represents a complete solution. Choose two.

A. NFS

B. SSL

C. ARP

D. PPP

Buy Now
Questions 6

Which of the following statements about Due Care policy is true?

A. It provides information about new viruses.

B. It is a method used to authenticate users on a network.

C. It identifies the level of confidentiality of information.

D. It is a method for securing database servers.

Buy Now
Questions 7

Which of the following protocols is used to securely connect to a private network by a remote client using the Internet?

A. PAP

B. PPTP

C. UDP

D. IPSec

Buy Now
Questions 8

Which of the following rate systems of the Orange book has no security controls?

A. C-rated

B. D-rated

C. A-rated

D. E-rated

Buy Now
Questions 9

Which of the following OSI model layers handles addressing and routing?

A. Session

B. Physical

C. Network

D. Application

Buy Now
Questions 10

Which of the following protocols is used to retrieve e-mails from a remote mail server?

A. SNMP

B. POP3

C. SMTP

D. IGMP

Buy Now
Questions 11

Which of the following uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients?

A. SSL

B. TLS

C. PGP

D. EAP

Buy Now
Questions 12

Which of the following are the ways of sending secure e-mail messages over the Internet? Each correct answer represents a complete solution. Choose two.

A. IPSec

B. S/MIME

C. PGP

D. TLS

Buy Now
Questions 13

Which of the following is a reason to implement security logging on a DNS server?

A. For monitoring unauthorized zone transfer

B. For preventing malware attacks on a DNS server

C. For recording the number of queries resolved

D. For measuring a DNS server's performance

Buy Now
Exam Code: GISP
Exam Name: GIAC Information Security Professional
Last Update: Apr 26, 2024
Questions: 659
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99