getcertified4sure.com

How Many Questions Of GISF Dumps Questions




We provide real GISF exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass GIAC GISF Exam quickly & easily. The GISF PDF type is available for reading and printing. You can print more and practice many times. With the help of our GIAC GISF dumps pdf and vce product and material, you can easily pass the GISF exam.

Check GISF free dumps before getting the full version:

NEW QUESTION 1

Which of the following types of cipher encrypts alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword?

  • A. Block cipher
  • B. Transposition cipher
  • C. Vigen re cipher
  • D. Stream cipher

Answer: C

NEW QUESTION 2

A Cisco Unified Wireless Network has an AP that does not rely on the central control device of the network. Which type of AP has this characteristic?

  • A. Lightweight AP
  • B. Rogue AP
  • C. LWAPP
  • D. Autonomous AP

Answer: D

NEW QUESTION 3

What are packet sniffers?

  • A. Packet sniffers encrypt the packages as they cross the network.
  • B. Packet sniffers test package security.
  • C. Packet sniffers test the packages to verify data integrity.
  • D. Packet sniffers capture the packages as they cross the network.

Answer: D

NEW QUESTION 4

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

  • A. Cyber squatting
  • B. Cyber Stalking
  • C. Man-in-the-middle attack
  • D. Spoofing

Answer: D

NEW QUESTION 5

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

  • A. The Configuration Manager
  • B. The Supplier Manager
  • C. The IT Service Continuity Manager
  • D. The Service Catalogue Manager

Answer: B

NEW QUESTION 6

Which of the following provide data confidentiality services by encrypting the data sent between wireless systems?
Each correct answer represents a complete solution. Choose two.

  • A. MS-CHAP v2
  • B. WEP
  • C. PAP
  • D. WPA

Answer: BC

NEW QUESTION 7

You are the project manager of a new project to install new hardware for your organization's computer network. You have never worked with networking software or hardware before so you enroll in a class to learn more about the technology you'll be managing in your project. This is an example of which one of the following?

  • A. Cost of nonconformance to quality
  • B. Enhancing your personal professional competence
  • C. Team development
  • D. A waste for the project as the project manager does not need to know much about the project's application

Answer: B

NEW QUESTION 8

John works as a professional Ethical Hacker. He has been assigned a project to test the
security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

  • A. PsList
  • B. Fpipe
  • C. Cain
  • D. PsExec

Answer: B

NEW QUESTION 9

A company would like your consulting firm to review its current network and suggest changes that will increase its efficiency and optimize the business processes.
To design such a network, you prepare a case study.
Which of the following policies should be implemented through a group policy that is associated with the netperfect.com domain?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose all that apply.

  • A. Account lockout policy.
  • B. Password policy.
  • C. Limit computers that can access production schedule software.
  • D. Assign MS Office suite to appropriate users.

Answer: ABD

NEW QUESTION 10

Which of the following types of attacks cannot be prevented by technical measures only?

  • A. Social engineering
  • B. Smurf DoS
  • C. Brute force
  • D. Ping flood attack

Answer: A

NEW QUESTION 11

Which of the following is the purpose of employing DMZ (Demilitarized zone) in a network?

  • A. It adds an additional layer of security to a Local Area Network (LAN).
  • B. It creates a check-point to a Local Area Network (LAN).
  • C. It adds an extra node to the Local Area Network (LAN).
  • D. It works along with the firewall to filter unwanted data packets.

Answer: A

NEW QUESTION 12

In packet filtering types of firewalls, which of the following specifies what traffic can and cannot traverse the firewall?

  • A. Internet bot
  • B. Access control list
  • C. ASDM
  • D. RIP

Answer: B

NEW QUESTION 13

Which of the following concepts represent the three fundamental principles of information security?
Each correct answer represents a complete solution. Choose three.

  • A. Privacy
  • B. Availability
  • C. Integrity
  • D. Confidentiality

Answer: BCD

NEW QUESTION 14

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

  • A. Data encrypted with the secret key can only be decrypted by another secret key.
  • B. The secret key can encrypt a message, and anyone with the public key can decrypt it.
  • C. Data encrypted by the public key can only be decrypted by the secret key.
  • D. The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

Answer: BC

NEW QUESTION 15

Which of the following statements about digital signature is true?

  • A. Digital signature is required for an e-mail message to get through a firewall.
  • B. Digital signature verifies the identity of the person who applies it to a document.
  • C. Digital signature decrypts the contents of documents.
  • D. Digital signature compresses the message to which it is applied.

Answer: B

NEW QUESTION 16
......

100% Valid and Newest Version GISF Questions & Answers shared by Downloadfreepdf.net, Get Full Dumps HERE: https://www.downloadfreepdf.net/GISF-pdf-download.html (New 333 Q&As)