Questions for the GISP were updated on : Nov 21 ,2025
Which of the following is a technique used to attack an Ethernet wired or wireless network?
D
You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the
browser's address bar, you are able to access the site. But, you are unable to access the site when
you enter http://www.PassGuide.com. What is the most likely cause?
C
Identify whether the given statement is true or false.
"Replay attack is a type of attack in which attackers capture packets containing passwords or digital
signatures whenever packets pass between two hosts on a network."
B
The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from
children under __ years of age without verifiable permission of a parent?
B
Which of the following law does not protect intellectual property?
A
Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?
D
Which of the following is not a level of military data-classification system?
B
Which of the following statements about DES (Data Encryption Standard) is true?
A
A ________ attack occurs when an attacker successfully inserts an intermediary software or program
between two communicating hosts.
A
Which of the following acts as an intermediary between a user on the internal network and a service
on the external network such as the Internet?
C
Which of the following should propose applicable and effective security controls for managing the
risks?
D
Which of the following groups represents the most likely source of an asset loss through the
inappropriate use of computers?
C
Which of the following protocols implements VPN using IPSec?
A
Which of the following are the major tasks of risk management?
Each correct answer represents a complete solution. Choose two.
B,C
Which of the following entities is used by Routers and firewalls to determine which packets should
be forwarded or dropped?
C