getcertified4sure.com

What Top Quality GISF Preparation Labs Is




It is impossible to pass GIAC GISF exam without any help in the short term. Come to Actualtests soon and find the most advanced, correct and guaranteed GIAC GISF practice questions. You will get a surprising result by our Improve GIAC Information Security Fundamentals practice guides.

GIAC GISF Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1

Peter is a merchant. He uses symmetric encryption to send confidential messages to different users of his Web site. Which of the following is the other name for asymmetric encryption?

  • A. Session key encryption
  • B. Public key encryption
  • C. Secret key encryption
  • D. Shared key encryption

Answer: B

NEW QUESTION 2

Which of the following components are usually found in an Intrusion detection system (IDS)?
Each correct answer represents a complete solution. Choose two.

  • A. Console
  • B. Sensor
  • C. Firewall
  • D. Modem
  • E. Gateway

Answer: AB

NEW QUESTION 3

You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. The messaging organization contains one Hub Transport server, one Client Access server, and two Mailbox servers.
You are planning to deploy an Edge Transport server in your messaging organization to minimize the attack surface. At which of the following locations will you deploy the Edge Transport server?

  • A. Active Directory site
  • B. Intranet
  • C. Behind the inner firewall of an organization
  • D. Perimeter network

Answer: D

NEW QUESTION 4

Which of the following protocols can help you get notified in case a router on a network fails?

  • A. SMTP
  • B. SNMP
  • C. TCP
  • D. ARP

Answer: B

NEW QUESTION 5

Which of the following protocols work at the Network layer of the OSI model?

  • A. Internet Group Management Protocol (IGMP)
  • B. Simple Network Management Protocol (SNMP)
  • C. Routing Information Protocol (RIP)
  • D. File Transfer Protocol (FTP)

Answer: AC

NEW QUESTION 6

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

  • A. Availability
  • B. Integrity
  • C. Confidentiality
  • D. Non-repudiation

Answer: B

NEW QUESTION 7

Which of the following attacks saturates network resources and disrupts services to a
specific computer?

  • A. Teardrop attack
  • B. Replay attack
  • C. Denial-of-Service (DoS) attack
  • D. Polymorphic shell code attack

Answer: C

NEW QUESTION 8

You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.
He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?

  • A. Malware protection
  • B. Automatic updating
  • C. Firewall
  • D. Other security settings

Answer: C

NEW QUESTION 9

The executive team wants you to track labor costs for your project as well as progress on task completion and the resulting dates. What information must you update for tasks to provide this information?

  • A. Start, Work, and Remaining Work
  • B. Actual Start and Percent Complete
  • C. Actual Start, Actual Work, and Remaining Work
  • D. Actual Start, Percent Complete, and Remaining Duration

Answer: C

NEW QUESTION 10

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

  • A. Transposition cipher
  • B. Message Authentication Code
  • C. Stream cipher
  • D. Block cipher

Answer: BCD

NEW QUESTION 11

You work as a Security manager for Orangesect Inc. The enterprise is using the OODA loop strategy to counter the security issues in the enterprise. Some of the IP addresses of the enterprise have been hacked. You match up the present hacking issue and condition with the past hacking experiences to find a solution. Which of the following phases of the OODA loop involves the procedure followed by you?

  • A. The decide phase
  • B. The orient phase
  • C. The observe phase
  • D. The act phase

Answer: B

NEW QUESTION 12

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

  • A. Sending deceptive e-mails
  • B. Sending notifications
  • C. Shunning
  • D. Logging
  • E. Spoofing
  • F. Network Configuration Changes

Answer: F

NEW QUESTION 13

Security is responsible for well-being of information and infrastructures in which the
possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Availability
  • B. Confidentiality
  • C. Confidentiality
  • D. Authenticity

Answer: ABCD

NEW QUESTION 14

Which of the following is used in asymmetric encryption?

  • A. Public key and user key
  • B. Public key and private key
  • C. SSL
  • D. NTFS

Answer: B

NEW QUESTION 15

Which of the following books is used to examine integrity and availability?

  • A. Brown Book
  • B. Red Book
  • C. Purple Book
  • D. Orange Book

Answer: B

NEW QUESTION 16
......

P.S. Easily pass GISF Exam with 333 Q&As Downloadfreepdf.net Dumps & pdf Version, Welcome to Download the Newest Downloadfreepdf.net GISF Dumps: https://www.downloadfreepdf.net/GISF-pdf-download.html (333 New Questions)