Our pass rate is high to 98.9% and the similarity percentage between our GISF study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the GIAC GISF exam in just one try? I am currently studying for the GIAC GISF exam. Latest GIAC GISF Test exam practice questions and answers, Try GIAC GISF Brain Dumps First.
Also have GISF free dumps questions for you:
NEW QUESTION 1
Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
Each correct answer represents a complete solution. Choose all that apply.
- A. Slack space
- B. Unused Sectors
- C. Dumb space
- D. Hidden partition
Answer: ABD
NEW QUESTION 2
The TCP/IP protocol suite uses _____ to identify which service a certain packet is destined for.
- A. Subnet masks
- B. IP addresses
- C. MAC addresses
- D. Port numbers
Answer: D
NEW QUESTION 3
Which of the following service provider classes is used to create a digital signature?
- A. RC2CryptoServiceProvider
- B. RNGCryptoServiceProvider
- C. DESCryptoServiceProvider
- D. SHA1CryptoServiceProvider
- E. MD5CryptoServiceProvider
- F. DSACryptoServiceProvider
Answer: F
NEW QUESTION 4
What is VeriSign?
- A. It is a data warehouse.
- B. It is an e-commerce portal.
- C. It is a search engine.
- D. It is a payment gateway.
Answer: D
NEW QUESTION 5
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?
- A. Configure Network address translation (NAT).
- B. Disable Windows firewall logging.
- C. Configure Internet Protocol Security (IPSec).
- D. Enable Windows firewall logging.
Answer: D
NEW QUESTION 6
Security is responsible for well-being of information and infrastructures in which the
possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security?
Each correct answer represents a complete solution. Choose all that apply.
- A. Availability
- B. Confidentiality
- C. Confidentiality
- D. Authenticity
Answer: ABCD
NEW QUESTION 7
Which of the following components are usually found in an Intrusion detection system (IDS)?
Each correct answer represents a complete solution. Choose two.
- A. Console
- B. Sensor
- C. Firewall
- D. Modem
- E. Gateway
Answer: AB
NEW QUESTION 8
Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?
Each correct answer represents a complete solution. Choose all that apply.
- A. Address Resolution Protocol (ARP)
- B. Network Link Protocol (NWLink)
- C. User Datagram Protocol (UDP)
- D. Internet Control Message Protocol (ICMP)
Answer: ACD
NEW QUESTION 9
Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer?
- A. IPLog
- B. Snort
- C. Timbersee
- D. Swatch
Answer: B
NEW QUESTION 10
Which of the following categories of the network management model is used to detect and log network problems or device failures?
- A. Fault Management
- B. Configuration Management
- C. Security Management
- D. Performance Management
Answer: A
NEW QUESTION 11
Which of the following are the goals of the cryptographic systems? Each correct answer represents a complete solution. Choose three.
- A. Availability
- B. Authentication
- C. Confidentiality
- D. Integrity
Answer: BCD
NEW QUESTION 12
Mark is implementing security on his e-commerce site. He wants to ensure that a customer sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?
- A. Packet filtering
- B. Authentication
- C. Firewall
- D. Digital signature
Answer: D
NEW QUESTION 13
In which of the following access control models can a user not grant permissions to other
users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?
- A. Discretionary Access Control (DAC)
- B. Role Based Access Control (RBAC)
- C. Access Control List (ACL)
- D. Mandatory Access Control (MAC)
Answer: D
NEW QUESTION 14
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He enters a single quote in the input field of the login page of the Weare- secure Web site and receives the following error message:
Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'
This error message shows that the We-are-secure Website is vulnerable to _____.
- A. A buffer overflow
- B. An XSS attack
- C. A Denial-of-Service attack
- D. A SQL injection attack
Answer: D
NEW QUESTION 15
Which of the following refers to a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens?
- A. Man-trap
- B. Man-in-the-middle
- C. Demilitarized zone (DMZ)
- D. Firewall
Answer: A
NEW QUESTION 16
......
P.S. Downloadfreepdf.net now are offering 100% pass ensure GISF dumps! All GISF exam questions have been updated with correct answers: https://www.downloadfreepdf.net/GISF-pdf-download.html (333 New Questions)