Page 1

GISP STUDY GUIDE AND QUESTIONS GISP Practice Test and Certification Guide

EDUSUM.COM Get complete detail on GISP exam guide to crack GIAC Information Security Professional. You can collect all information on GISP tutorial, practice test, books, study material, exam questions, and syllabus. Firm your knowledge on GIAC Information Security Professional and get ready to crack GISP certification. Explore all information on GISP exam with number of questions, passing percentage and time duration to complete test.


WWW.EDUSUM.COM

PDF

Introduction to GIAC Information Security Professional (GISP) Exam The GIAC GISP Exam is challenging and thorough preparation is essential for success. This exam study guide is designed to help you prepare for the GISP certification exam. It contains a detailed list of the topics covered on the Professional exam, as well as a detailed list of preparation resources. These study guide for the GIAC Information Security Professional will help guide you through the study process for your certification.

GISP GIAC Information Security Professional Exam Summary ● ● ● ● ●

Exam Name: GIAC Information Security Professional Exam Code: GISP Exam Price: $1899 (USD) Duration: 300 mins Number of Questions: 250

GISP: Information Security Professional

1


WWW.EDUSUM.COM

● ● ● ●

PDF

Passing Score: 70% Schedule Exam: Pearson VUE Sample Questions: GIAC GISP Sample Questions Recommended Practice: GIAC GISP Certification Practice Exam

Exam Syllabus: GISP GIAC Information Security Professional (GISP) 1. Asset Security - The candidate will demonstrate an understanding of asset management and classification, including access controls, handling and retention requirements. 2. Communications and Network Security - The candidate will demonstrate an understanding of network security, including secure architecture, network protocols, security controls and devices, and common network attacks. 3. Identity and Access Management - The candidate will demonstrate an understanding of identity management concepts and controls including AAA, passwords, tokens, biometrics, federation, and common threats. 4. Security and Risk Management - The candidate will demonstrate and understanding of security risk management and business continuity practices, including legal and regulatory compliance, security policies, and governance principles. 5. Security Assessment and Testing - The candidate will demonstrate the ability to design, perform, and analyze security tests 6. Security Engineering - The candidate will demonstrate an understanding of secure engineering architecture and implementation for systems in networked, web based, and mobile environments and mitigating common vulnerabilities. 7. Security Operation - The candidate will be able to demonstrate an understanding of the managerial, administrative, operational aspects of information security.

GISP: Information Security Professional

2


WWW.EDUSUM.COM

PDF

8. Software Development Security - The candidate will be able to demonstrate an understanding of the key security principles related to secure application development.

GIAC GISP Certification Sample Questions and Answers To make you familiar with GIAC Information Security Professional (GISP) certification exam structure, we have prepared this sample question set. We suggest you to try our Sample Questions for GISP Certification to test your understanding of GIAC GISP process with real GIAC certification exam environment. GISP GIAC Information Security Professional Sample Questions:01. In which type of access control do user ID and password system come under? a) Power b) Physical c) Technical d) Administrative 02. Which of the following terms is synonymous with the willful destruction of another person's property? a) Hacking b) Vandalism c) Spoofing d) Phishing 03. Which of the following hardware devices prevents broadcasts from crossing over subnets? a) Bridge b) Router c) Modem d) Hub 04. The TCP/IP protocol suite uses ____ to identify which service a certain packet is destined for. a) MAC addresses b) Port numbers

GISP: Information Security Professional

3


WWW.EDUSUM.COM

PDF

c) Subnet masks d) IP addresses 05. At which of the following layers Structured Query Language (SQL) works? a) Physical b) Network c) Transport d) Session 06. Which of the following practices come in the category of denial of service attack? a) Sending lots of ICMP packets to an IP address b) Disrupting services to a specific computer c) Performing Back door attack on a system d) Sending thousands of malformed packets to a network for bandwidth consumption 07. __________ is the process of verifying the identity of a user and obtaining required evidences from the user. a) Verification b) Impersonation c) Authentication d) Authorization 08. How many keys are used to encrypt data in symmetric encryption? a) Two b) Three c) Four d) One 09. Which of the following allows an administrator to find weak passwords on the network? a) Rainbow table b) Back door c) Worm d) Access control list 10. Key escrow is a method of __________. a) Key renewal b) Key distribution c) Key recovery d) key revocation

Answers:-

GISP: Information Security Professional

4


WWW.EDUSUM.COM

PDF

Answer 1:- c Answer 2:- b Answer 3:- b Answer 4:- b Answer 5:- d Answer 6:- a, b, d Answer 7:- c Answer 8:- d Answer 9:- a Answer 10:- c

GISP: Information Security Professional

5

Profile for Katy Morgan

[PDF] GISP Study Guide and Questions  

Start Here---> http://bit.ly/33J47FB <---Get complete detail on GISP exam guide to crack GIAC Information Security Professional. You can col...

[PDF] GISP Study Guide and Questions  

Start Here---> http://bit.ly/33J47FB <---Get complete detail on GISP exam guide to crack GIAC Information Security Professional. You can col...

Advertisement