getcertified4sure.com

The Secret Of GIAC GISF Prep




Exam Code: GISF (Practice Exam Latest Test Questions VCE PDF)
Exam Name: GIAC Information Security Fundamentals
Certification Provider: GIAC
Free Today! Guaranteed Training- Pass GISF Exam.

Free GISF Demo Online For GIAC Certifitcation:

NEW QUESTION 1

Which of the following wireless security features provides the best wireless security mechanism?

  • A. WPA with 802.1X authentication
  • B. WPA with Pre Shared Key
  • C. WPA
  • D. WEP

Answer: A

NEW QUESTION 2

Which of the following is NOT a phase of the OODA Loop strategy?

  • A. Observe
  • B. Define
  • C. Orient
  • D. Act

Answer: B

NEW QUESTION 3

You discover that someone has been logging onto your network after office hours. After investigating this you find the login belongs to someone who left the company 12 months ago. What would have been the best method to prevent this?

  • A. A policy with time of day restrictions.
  • B. An IDS system.
  • C. A policy with account expiration.
  • D. A DMZ firewall.

Answer: C

NEW QUESTION 4

Tom works as the project manager for BlueWell Inc. He is working with his project to ensure timely and appropriate generation, retrieval, distribution, collection, storage, and ultimate disposition of project information. What is the process in which Tom is working?

  • A. Stakeholder expectation management
  • B. Stakeholder analysis
  • C. Work performance measurement
  • D. Project communication management

Answer: D

NEW QUESTION 5

Which of the following statements about Secure Shell (SSH) are true? Each correct answer represents a complete solution. Choose three.

  • A. It was designed as a replacement for TELNET and other insecure shells.
  • B. It is a network protocol used primarily on Linux and Unix based systems.
  • C. It allows data to be exchanged using a secure channel between two networked devices.
  • D. It is the core routing protocol of the Internet.

Answer: ABC

NEW QUESTION 6

Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult?

  • A. Multipartite virus
  • B. Polymorphic virus
  • C. Armored virus
  • D. Stealth virus

Answer: C

NEW QUESTION 7

At which OSI layer does UDP operate?

  • A. Network layer
  • B. Data-link layer
  • C. Session layer
  • D. Transport layer
  • E. Presentation layer

Answer: D

NEW QUESTION 8

You are the security manager of Microliss Inc. Your enterprise uses a wireless network infrastructure with access points ranging 150-350 feet. The employees using the network complain that their passwords and important official information have been traced. You discover the following clues:
The information has proved beneficial to another company.
The other company is located about 340 feet away from your office. The other company is also using wireless network.
The bandwidth of your network has degraded to a great extent. Which of the following methods of attack has been used?

  • A. A piggybacking attack has been performed.
  • B. The information is traced using Bluebugging.
  • C. A DOS attack has been performed.
  • D. A worm has exported the information.

Answer: A

NEW QUESTION 9

Hardening a system is one of the practical methods of securing a computer system. Which of the following techniques is used for hardening a computer system?

  • A. Disabling all user accounts
  • B. Applying egress filtering
  • C. Applying Access Control List (ACL)
  • D. Applying a patch to the OS kernel

Answer: D

NEW QUESTION 10

You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted, however, you want the least overhead/difficulty in the encryption process. Which of the following should you choose?

  • A. MD5
  • B. DES
  • C. Symmetric Encryption
  • D. Asymmetric Encryption

Answer: D

NEW QUESTION 11

Which of the following protocols are used by Network Attached Storage (NAS)?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Apple Filing Protocol (AFP)
  • B. Server Message Block (SMB)
  • C. Network File System (NFS)
  • D. Distributed file system (Dfs)

Answer: ABC

NEW QUESTION 12

Which of the following is the primary function of VPNs?

  • A. To establish private connections over public networks
  • B. To make virtual connections for remote access
  • C. To establish a wireless connections to networks
  • D. To access networks remotely

Answer: A

NEW QUESTION 13

You work as a Software Developer for uCertify Inc. You have developed a Data Access Logic (DAL) component that will be part of a distributed application. You are conducting integration testing with other components of the distributed application. Which of the following types of testing methods will you need to perform to identify potential security- related issues? Each correct answer represents a part of the solution. Choose two.

  • A. Unit testing
  • B. Stress testing
  • C. Load testing
  • D. Black box testing
  • E. White box testing

Answer: DE

NEW QUESTION 14

Which of the following is a remote access protocol that supports encryption?

  • A. PPP
  • B. SLIP
  • C. UDP
  • D. SNMP

Answer: A

NEW QUESTION 15

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Slack space
  • B. Unused Sectors
  • C. Dumb space
  • D. Hidden partition

Answer: ABD

NEW QUESTION 16
......

P.S. Thedumpscentre.com now are offering 100% pass ensure GISF dumps! All GISF exam questions have been updated with correct answers: https://www.thedumpscentre.com/GISF-dumps/ (333 New Questions)