Act now and download your GIAC GISF test today! Do not waste time for the worthless GIAC GISF tutorials. Download Renovate GIAC GIAC Information Security Fundamentals exam with real questions and answers and begin to learn GIAC GISF with a classic professional.

Free demo questions for GIAC GISF Exam Dumps Below:

NEW QUESTION 1

Which of the following tools can be used to perform tasks such as Windows password cracking Windows enumeration, and VoIP session sniffing?

  • A. John the Ripper
  • B. Obiwan
  • C. Cain
  • D. L0phtcrack

Answer: C

NEW QUESTION 2

Which of the following types of firewalls forms a session flow table?

  • A. Proxy server firewall
  • B. Packet filtering firewall
  • C. Stateless packet filtering firewall
  • D. Stateful packet filtering firewall

Answer: D

NEW QUESTION 3

Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?

  • A. Asymmetric
  • B. Symmetric
  • C. Numeric
  • D. Hashing

Answer: B

NEW QUESTION 4

You work as a Network Administrator for ABC Inc. The company has a secure wireless network.
However, in the last few days, an attack has been taking place over and over again. This attack is taking advantage of ICMP directed broadcast. To stop this attack, you need to disable ICMP directed broadcasts. Which of the following attacks is taking place?

  • A. Smurf attack
  • B. Sniffer attack
  • C. Cryptographic attack
  • D. FMS attack

Answer: A

NEW QUESTION 5

You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?

  • A. Utilize protocol analyzers.
  • B. User performance monitors.
  • C. Implement signature based antivirus.
  • D. Implement an anomaly based IDS.

Answer: D

NEW QUESTION 6

You work as a Network Administrator for Tech World Inc. The company has a TCP/IP- based router. You have configured a router on your network. You want to accomplish the following goals:
l Configure the router to require a password to move from user EXEC mode to privileged EXEC mode.
l The password must be listed as a hidden entry in the configuration file. You run the following command: enable password <password>
Which of the goals will this action accomplish?

  • A. The password will be listed as a hidden entry in the configuration file
  • B. The action will accomplish neither of the goals
  • C. The action will accomplish both the goals
  • D. The router will require a password to move from user EXEC mode to privileged EXEC mode

Answer: D

NEW QUESTION 7

You have created a Web site, which will be used for e-commerce. You want to ensure that the transactions are highly secured. For this purpose, you have to create a system to verify the identity of a potential customer. Which of the following security techniques will you use?

  • A. Asymmetric encryption
  • B. Symmetric encryption
  • C. Spoofing
  • D. Digital certificate

Answer: D

NEW QUESTION 8

Which of the following algorithms produce 160-bit hash values? Each correct answer represents a complete solution. Choose two.

  • A. MD2
  • B. MD5
  • C. SHA-1
  • D. SHA-0

Answer: CD

NEW QUESTION 9

You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. The messaging organization contains one Hub Transport server, one Client Access server, and two Mailbox servers.
You are planning to deploy an Edge Transport server in your messaging organization to minimize the attack surface. At which of the following locations will you deploy the Edge Transport server?

  • A. Active Directory site
  • B. Intranet
  • C. Behind the inner firewall of an organization
  • D. Perimeter network

Answer: D

NEW QUESTION 10

Which of the following best describes the identification, analysis, and ranking of risks?

  • A. Design of experiments
  • B. Fast tracking
  • C. Fixed-price contracts
  • D. Plan Risk management

Answer: D

NEW QUESTION 11

You work as the Network Administrator of TechJobs. You implement a security policy, to be in effect at all times, on the client computer in your network. While troubleshooting, assistant administrators often change security settings on the network. You want the security policy to be reapplied after changes have been made. How can you automate this task? (Click the Exhibit button on the toolbar to see the case study.)

  • A. Create a group policy object (GPO) and implement it to the domai
  • B. Configure a security policy on i
  • C. Give Administrators read-only permission on that GPO.
  • D. Create a separate OU for the Administrators to test the security settings.
  • E. Ask the assistant administrators to re-apply the security policy after the changes have been made.
  • F. Schedule the SECEDIT command to run on the client computers.

Answer: D

NEW QUESTION 12

Under the SMART scheme, the Predictive Failure Analysis Technology is used to determine the failure or crash for which of the following parts of a computer system?

  • A. Operating System
  • B. Hard Disc drive
  • C. Software
  • D. Internet Browser

Answer: B

NEW QUESTION 13

Your computer continues to operate even if its disk drive has failed. This ability is known as _____.

  • A. Recovery
  • B. Fault Tolerance
  • C. Backups
  • D. Disaster Recovery
  • E. Hashing
  • F. Independent Disks

Answer: B

NEW QUESTION 14

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

  • A. Risk acceptance
  • B. Risk transfer
  • C. Risk avoidance
  • D. Risk mitigation

Answer: B

NEW QUESTION 15

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

  • A. Cryptography
  • B. OODA loop
  • C. Risk analysis
  • D. Firewall security

Answer: A

NEW QUESTION 16
......

P.S. Easily pass GISF Exam with 333 Q&As Dumps-files.com Dumps & pdf Version, Welcome to Download the Newest Dumps-files.com GISF Dumps: https://www.dumps-files.com/files/GISF/ (333 New Questions)