GISP GIAC Information Security Professional

By
With
Comments Off on GISP GIAC Information Security Professional

GISCI Geospatial Core Technical Knowledge Exam
The GISCI Geospatial Core Technical Knowledge ExamR is a groundbreaking development in the geospatial profession, software-agnostic, based upon a job analysis from a four-year experience level, informed by the GIS&T Body of Knowledge, guided by the Geospatial Technology Competency Model (GTCM), and centered upon the six key knowledge areas shown elsewhere on these pages. It was developed by GISPs for the GISP Certification.

The Exam
Answering 75% of questions correct is passing.
The Exam is 4 hours and contains between 175 questions and 195 questions. 100 of those questions will be scored.
The Exam questions not scored will be evaluated for use as scored questions in the future.
The Exam questions will come from the following Knowledge Categories:
Conceptual Foundations (12%)
Cartography & Visualization (14%)
GIS Design Aspects & Data Modeling (29%)
GIS Analytical Methods (17%)
Data Manipulation (15%)
Geospatial Data (13%)
For more information on these areas, consult the Exam Candidate Manual or the UCGIS-produced GIS&T Body of Knowledge for specific references from each Knowledge Area.
Current Exam pass rates have reached 60%.

Costs
GISP Portfolio Review (Ethics, Education, Experience, Contributions): $100
GISCI Geospatial Core Technical Exam Fee: $250 for North American location, $ 300 for an International location
Exam Application Fee (one-time): $ 100
All GISPs and all recertifying GISPs will be subject to an annual maintenance fee of $95/year, payable on the 1st anniversary of initial GISP Certification, or upon recertification approval.
Active GISPs looking to recertify do not have to take the Exam. Those whose certification has expired and have exceeded the one-year grace period will be required to pass the Exam in order to be reinstated.


QUESTION: 1
Which of the following is a technique used to attack an Ethernet wired or wireless network?

A. DNS poisoning
B. Keystroke logging
C. Mail bombing
D. ARP poisoning

Answer: D


QUESTION: 2
Which of the following refers to encrypted text?

A. Plaintext
B. Cookies
C. Hypertext
D. Ciphertext

Answer: D


QUESTION: 3
Which of the following are the benefits of information classification for an organization?

A. It helps identify which information is the most sensitive or vital to an organization.
B. It ensures that modifications are not made to data by unauthorized personnel or processes.
C. It helps identify which protections apply to which information.
D. It helps reduce the Total Cost of Ownership (TCO).

Answer: A,C


QUESTION: 4
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those
resources that are required for them. Which of the following access control models will he use?

A. Role-Based Access Control
B. Discretionary Access Control
C. Mandatory Access Control
D. Policy Access Control

Answer: A


QUESTION: 5
Which of the following are methods used for authentication?
Each correct answer represents a complete solution. Choose all that apply.

A. Smart card
B. Biometrics
C. Username and password
D. Magnetic stripe card

Answer: A,B,C,D

Click here to view complete Q&A of GISP exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best GIAC Management GISP Certification, GIAC Management GISP Training at certkingdom.com