GISF Exam Questions - Online Test


GISF Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

It is impossible to pass GIAC GISF exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed GIAC GISF practice questions. You will get a surprising result by our Up to the minute GIAC Information Security Fundamentals practice guides.

Online GISF free questions and answers of New Version:

NEW QUESTION 1

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host?

  • A. Blackbox testing
  • B. Firewalking
  • C. Brainstorming
  • D. Port redirection

Answer: D

NEW QUESTION 2

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Samhain
  • B. SARA
  • C. Snort
  • D. Tripwire

Answer: AC

NEW QUESTION 3

Which of the following roles is used to ensure that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

  • A. The Service Level Manager
  • B. The Configuration Manager
  • C. The IT Security Manager
  • D. The Change Manager

Answer: C

NEW QUESTION 4

You are a Consumer Support Technician. You are helping a user troubleshoot computer- related issues. While troubleshooting the user's computer, you find a malicious program similar to a virus or worm. The program negatively affects the privacy and security of the computer and is capable of damaging the computer. Which of the following alert levels of Windows Defender is set for this program?

  • A. Low
  • B. High
  • C. Severe
  • D. Medium

Answer: C

NEW QUESTION 5

Which of the following statements are true about Dsniff?
Each correct answer represents a complete solution. Choose two.

  • A. It is a virus.
  • B. It contains Trojans.
  • C. It is antivirus.
  • D. It is a collection of various hacking tools.

Answer: BD

NEW QUESTION 6

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

  • A. Sending deceptive e-mails
  • B. Sending notifications
  • C. Shunning
  • D. Logging
  • E. Spoofing
  • F. Network Configuration Changes

Answer: F

NEW QUESTION 7

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

  • A. Availability
  • B. Integrity
  • C. Confidentiality
  • D. Non-repudiation

Answer: B

NEW QUESTION 8

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions, which is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Attacker can exploit any protocol used to go into the internal network or intranet of the com pany.
  • B. Attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different.
  • C. Attacker can gain access to the Web server in a DMZ and exploit the database.
  • D. Attacker can perform Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network.

Answer: ACD

NEW QUESTION 9

Which of the following processes is described in the statement below?
"It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

  • A. Perform Quantitative Risk Analysis
  • B. Perform Qualitative Risk Analysis
  • C. Monitor and Control Risks
  • D. Identify Risks

Answer: C

NEW QUESTION 10

Which of the following processes is accountable for monitoring an IT Service and detecting when the performance drops beneath adequate limits?

  • A. Service Asset and Configuration Management
  • B. Service Request Management
  • C. Event Management
  • D. Service Level Management

Answer: C

NEW QUESTION 11

Which of the following types of authentications supported by OSPF? Each correct answer represents a complete solution. Choose three.

  • A. MD5 authentication
  • B. Simple password authentication
  • C. Null authentication
  • D. Kerberos v5 authentication

Answer: ABC

NEW QUESTION 12

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

  • A. Bandwidth
  • B. Load
  • C. Delay
  • D. Frequency

Answer: D

NEW QUESTION 13

Which of the following statements about Encapsulating Security Payload (ESP) are true? Each correct answer represents a complete solution. Choose two.

  • A. It can also be nested with the Layer Two Tunneling Protocol (L2TP).
  • B. It is an IPSec protocol.
  • C. It is a text-based communication protocol.
  • D. It uses TCP port 22 as the default port and operates at the application layer.

Answer: AB

NEW QUESTION 14

How should you configure the Regional Centers' e-mail, so that it is secure and encrypted? (Click the Exhibit button on the toolbar to see the case study.)

  • A. Use EFS.
  • B. Use IPSec.
  • C. Use S/MIME.
  • D. Use TLS.

Answer: C

NEW QUESTION 15

Security is responsible for well-being of information and infrastructures in which the
possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Availability
  • B. Confidentiality
  • C. Confidentiality
  • D. Authenticity

Answer: ABCD

NEW QUESTION 16
CORRECT TEXT
Fill in the blank with the appropriate layer name.
The Network layer of the OSI model corresponds to the ______ layer of the TCP/IP model.


Solution:
Internet

Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 17
......

P.S. Easily pass GISF Exam with 333 Q&As Downloadfreepdf.net Dumps & pdf Version, Welcome to Download the Newest Downloadfreepdf.net GISF Dumps: https://www.downloadfreepdf.net/GISF-pdf-download.html (333 New Questions)