getcertified4sure.com

Download GIAC GISF Actual Exam Online




Want to know Actualtests GISF Exam practice test features? Want to lear more about GIAC GIAC Information Security Fundamentals certification experience? Study Guaranteed GIAC GISF answers to Update GISF questions at Actualtests. Gat a success with an absolute guarantee to pass GIAC GISF (GIAC Information Security Fundamentals) test on your first attempt.

GIAC GISF Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e- mails.
Which of the following will you use to accomplish this?

  • A. NTFS
  • B. PPTP
  • C. PGP
  • D. IPSec

Answer: C

NEW QUESTION 2

You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

  • A. Vertical Privilege Escalation
  • B. Session Hijacking
  • C. Account hijacking
  • D. Horizontal Privilege Escalation

Answer: D

NEW QUESTION 3

You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company's network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?

  • A. Antivirus software is running on the computer.
  • B. You have provided an improper product key.
  • C. The computer is running a driver that is incompatible with Vista.
  • D. The computer has a hardware device that is incompatible with Vista.

Answer: A

NEW QUESTION 4

The IT Director of the company is very concerned about the security of the network. Which audit policy should he implement to detect possible intrusions into the network? (Click the Exhibit button on the toolbar to see the case study.)

  • A. The success and failure auditing for policy change.
  • B. The success and failure auditing for process tracking.
  • C. The success and failure auditing for logon events.
  • D. The success and failure auditing for privilege use.

Answer: C

NEW QUESTION 5

Jane works as a Consumer Support Technician for McRoberts Inc. The company provides troubleshooting support to users. A user named Peter installs Windows Vista on his computer. He connects his computer on the network. He wants to protect his computer from malicious software and prevent hackers from gaining access to his computer through the network. Which of the following actions will Jane assist Peter to perform to accomplish the task?

  • A. Don't stay logged on as an administrator.
  • B. Use a firewall.
  • C. Keep the computer up-to-date.
  • D. Run antivirus software on the computer.

Answer: B

NEW QUESTION 6

Which of the following categories of the network management model is used to detect and log network problems or device failures?

  • A. Fault Management
  • B. Configuration Management
  • C. Security Management
  • D. Performance Management

Answer: A

NEW QUESTION 7

Which of the following is an organization that defines standards for anti-virus software?

  • A. ICSA
  • B. IETF
  • C. IIS
  • D. IEEE

Answer: A

NEW QUESTION 8

Which of the following roles is used to ensure that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

  • A. The Service Level Manager
  • B. The Configuration Manager
  • C. The IT Security Manager
  • D. The Change Manager

Answer: C

NEW QUESTION 9

Andrew works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains five Windows 2008 member servers and 120 Windows XP Professional client computers. Andrew is concerned about the member servers that are not meeting the security requirements as mentioned in the security policy of the company. Andrew wants to compare the current security settings of the member servers with the security template that is configured according to the security policy of the company. Which of the following tools will Andrew use to accomplish this?

  • A. Security Configuration and Analysis Tool
  • B. Active Directory Migration Tool (ADMT)
  • C. Task Manager
  • D. Group Policy Management Console (GPMC)

Answer: A

NEW QUESTION 10

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

  • A. Bandwidth
  • B. Load
  • C. Delay
  • D. Frequency

Answer: D

NEW QUESTION 11

The Project Risk Management knowledge area focuses on which of the following processes?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Risk Management Planning
  • B. Quantitative Risk Analysis
  • C. Potential Risk Monitoring
  • D. Risk Monitoring and Control

Answer: ABD

NEW QUESTION 12

Which of the following authentication methods uses MD5 hash encoding while transferring credentials over a network?

  • A. .NET Passport authentication
  • B. Advanced Digest authentication
  • C. Integrated Windows authentication
  • D. Digest authentication

Answer: B

NEW QUESTION 13

Which of the following U.S.C. laws is governs the fraudulent activities associated with computers?

  • A. 18 U.S.
  • B. 2251
  • C. 18 U.S.
  • D. 3771
  • E. 18 U.S.
  • F. 2257
  • G. 18 U.S.
  • H. 1030

Answer: D

NEW QUESTION 14

Which of the following is not needed for effective procurement planning?

  • A. Activity resource management
  • B. Project schedule
  • C. Cost baseline
  • D. Quality risk analysis

Answer: D

NEW QUESTION 15

You work as a Network Administrator for Net World Inc. The company has a TCP/IP-based network.
You have configured an Internet access router on the network. A user complains that he is unable to access a resource on the Web. You know that a bad NAT table entry is causing the issue. You decide to clear all the entries on the table. Which of the following commands will you use?

  • A. show ip dhcp binding
  • B. ipconfig /flushdns
  • C. ipconfig /all
  • D. clear ip nat translation *

Answer: D

NEW QUESTION 16
......

P.S. Dumps-hub.com now are offering 100% pass ensure GISF dumps! All GISF exam questions have been updated with correct answers: https://www.dumps-hub.com/GISF-dumps.html (333 New Questions)