GISF Exam Questions - Online Test


GISF Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Want to know Testking GISF Exam practice test features? Want to lear more about GIAC GIAC Information Security Fundamentals certification experience? Study Guaranteed GIAC GISF answers to Abreast of the times GISF questions at Testking. Gat a success with an absolute guarantee to pass GIAC GISF (GIAC Information Security Fundamentals) test on your first attempt.

Also have GISF free dumps questions for you:

NEW QUESTION 1

You discover that someone has been logging onto your network after office hours. After investigating this you find the login belongs to someone who left the company 12 months ago. What would have been the best method to prevent this?

  • A. A policy with time of day restrictions.
  • B. An IDS system.
  • C. A policy with account expiration.
  • D. A DMZ firewall.

Answer: C

NEW QUESTION 2

Which of the following combines the characteristics of a bridge and a router?

  • A. Firewall
  • B. Brouter
  • C. Switch
  • D. Hub
  • E. Repeater

Answer: B

NEW QUESTION 3

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

  • A. Organizing a solution to remove an incident
  • B. Building up an incident response kit
  • C. Working with QA to validate security of the enterprise
  • D. Setting up the initial position after an incident

Answer: B

NEW QUESTION 4

Which of the following factors determine the strength of the encryption?

  • A. Character-set encoding
  • B. Length of the key
  • C. Operating system
  • D. Ease of use

Answer: B

NEW QUESTION 5

Under the SMART scheme, the Predictive Failure Analysis Technology is used to determine the failure or crash for which of the following parts of a computer system?

  • A. Operating System
  • B. Hard Disc drive
  • C. Software
  • D. Internet Browser

Answer: B

NEW QUESTION 6

Which of the following is NOT a phase of the OODA Loop strategy?

  • A. Observe
  • B. Define
  • C. Orient
  • D. Act

Answer: B

NEW QUESTION 7

You work as a Network Administrator for Net World Inc. The company has a TCP/IP-based network.
You have configured an Internet access router on the network. A user complains that he is unable to access a resource on the Web. You know that a bad NAT table entry is causing the issue. You decide to clear all the entries on the table. Which of the following commands will you use?

  • A. show ip dhcp binding
  • B. ipconfig /flushdns
  • C. ipconfig /all
  • D. clear ip nat translation *

Answer: D

NEW QUESTION 8

Mark works as a Customer Support Technician for uCertify Inc. The company provides troubleshooting support to users. Mark is troubleshooting a computer of a user who is working on Windows Vista. The user reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center should Mark configure to save the user's data?

  • A. Automatic updating
  • B. Firewall
  • C. Malware protection
  • D. Content Advisor

Answer: A

NEW QUESTION 9

Which of the following is the primary function of VPNs?

  • A. To establish private connections over public networks
  • B. To make virtual connections for remote access
  • C. To establish a wireless connections to networks
  • D. To access networks remotely

Answer: A

NEW QUESTION 10

You work as a Network Administrator for Infosec Inc. You find that not only have security applications running on the server, including software firewalls, anti-virus programs, and anti-spyware programs been disabled, but anti-virus and anti-spyware definitions have also been deleted. You suspect that this situation has arisen due to malware infection. Which of the following types of malware is the most likely cause of the issue?

  • A. Whack-A-Mole
  • B. FireKiller 2000
  • C. Beast
  • D. SubSeven

Answer: B

NEW QUESTION 11

Which of the following tools are used to determine the hop counts of an IP packet? Each correct answer represents a complete solution. Choose two.

  • A. Netstat
  • B. Ping
  • C. TRACERT
  • D. IPCONFIG

Answer: BC

NEW QUESTION 12

Which of the following types of attacks cannot be prevented by technical measures only?

  • A. Social engineering
  • B. Smurf DoS
  • C. Brute force
  • D. Ping flood attack

Answer: A

NEW QUESTION 13

Which of the following are the examples of administrative controls?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Data Backup
  • B. Security policy
  • C. Security awareness training
  • D. Auditing

Answer: BC

NEW QUESTION 14

Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?

  • A. Asymmetric
  • B. Symmetric
  • C. Numeric
  • D. Hashing

Answer: B

NEW QUESTION 15

Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult?

  • A. Multipartite virus
  • B. Polymorphic virus
  • C. Armored virus
  • D. Stealth virus

Answer: C

NEW QUESTION 16

Which of the following protocols provides secured transaction of data between two computers?

  • A. SSH
  • B. FTP
  • C. Telnet
  • D. RSH

Answer: A

NEW QUESTION 17
......

100% Valid and Newest Version GISF Questions & Answers shared by Surepassexam, Get Full Dumps HERE: https://www.surepassexam.com/GISF-exam-dumps.html (New 333 Q&As)