Top Tips Of Leading GISF Training

It is more faster and easier to pass the GIAC GISF exam by using Certified GIAC GIAC Information Security Fundamentals questuins and answers. Immediate access to the Renew GISF Exam and find the same core area GISF questions with professionally verified answers, then PASS your exam with a high score now.

Free GISF Demo Online For GIAC Certifitcation:

NEW QUESTION 1

You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

  • A. FTP
  • B. Gopher
  • C. Firewall
  • D. HTTP

Answer: C

NEW QUESTION 2

You are the project manager of a new project in your organization. You and the project team have identified the project risks, completed risk analysis, and are planning the most appropriate risk responses. Which of the following tools is most effective to choose the most appropriate risk response?

  • A. Project network diagrams
  • B. Delphi Technique
  • C. Decision tree analysis
  • D. Cause-and-effect diagrams

Answer: C

NEW QUESTION 3

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

  • A. TCP FTP proxy scanning
  • B. Eavesdropping
  • C. Fingerprinting
  • D. Web ripping

Answer: D

NEW QUESTION 4

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

  • A. Quantitative analysis
  • B. Qualitative analysis
  • C. Estimate activity duration
  • D. Risk identification

Answer: B

NEW QUESTION 5

Mark works as a Customer Support Technician for uCertify Inc. The company provides troubleshooting support to users. Mark is troubleshooting a computer of a user who is working on Windows Vista. The user reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center should Mark configure to save the user's data?

  • A. Automatic updating
  • B. Firewall
  • C. Malware protection
  • D. Content Advisor

Answer: A

NEW QUESTION 6

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

  • A. Availability
  • B. Integrity
  • C. Confidentiality
  • D. Non-repudiation

Answer: B

NEW QUESTION 7

Which of the following is a valid IP address for class B Networks?

  • A. 172.157.88.3
  • B. 80.33.5.7
  • C. 212.136.45.8
  • D. 225.128.98.7

Answer: A

NEW QUESTION 8

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

  • A. S/MIME
  • B. Asymmetric
  • C. PGP
  • D. Symmetric

Answer: D

NEW QUESTION 9

You have successfully installed an IRM server into your environment. This IRM server will be utilized to protect the company's videos, which are available to all employees but contain sensitive data. You log on to the WSS 3.0 server with administrator permissions and navigate to the Operations section. What option should you now choose so that you can input the RMS server name for the WSS 3.0 server to use?

  • A. Self-service site management
  • B. Content databases
  • C. Information Rights Management
  • D. Define managed paths

Answer: C

NEW QUESTION 10

Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?

  • A. S/MIME
  • B. PGP
  • C. Asymmetric encryption
  • D. Symmetric encryption

Answer: D

NEW QUESTION 11

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e- mails.
Which of the following will you use to accomplish this?

  • A. NTFS
  • B. PPTP
  • C. PGP
  • D. IPSec

Answer: C

NEW QUESTION 12

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

  • A. Bandwidth
  • B. Load
  • C. Delay
  • D. Frequency

Answer: D

NEW QUESTION 13

Which of the following refers to encrypted text?

  • A. Plaintext
  • B. Cookies
  • C. Ciphertext
  • D. Hypertext

Answer: C

NEW QUESTION 14

Which of the following algorithms produce 160-bit hash values? Each correct answer represents a complete solution. Choose two.

  • A. MD2
  • B. MD5
  • C. SHA-1
  • D. SHA-0

Answer: CD

NEW QUESTION 15

You are the Administrator for a corporate network. You are concerned about denial of service attacks. Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

  • A. Shorten the timeout for connection attempts.
  • B. Place a honey pot in the DMZ.
  • C. Implement a strong password policy.
  • D. Implement network based antivirus.

Answer: A

NEW QUESTION 16

Your network utilizes a coax cable for connections between various network segments. Your predecessor made sure none of the coax cables were in an exposed area that could easily be accessed. This caused the use of significant extra cabling. Why do you think this was done?

  • A. This was an error you should correc
  • B. It wastes the cable and may make maintenance more difficult.
  • C. He was concerned about wireless interception of data.
  • D. He was concerned about electromagnetic emanation being used to gather data.
  • E. He was concerned about vampire taps.

Answer: D

NEW QUESTION 17

Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?

  • A. Firewall
  • B. Automatic Updating
  • C. Other Security Settings
  • D. Malware Protection

Answer: A

NEW QUESTION 18

Mark is implementing security on his e-commerce site. He wants to ensure that a customer
sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?

  • A. Authentication
  • B. Firewall
  • C. Packet filtering
  • D. Digital signature

Answer: D

NEW QUESTION 19

Which of the following options cannot be accessed from Windows Update?

  • A. Restore Hidden Updates
  • B. Check for Updates
  • C. View Update History
  • D. View AntiVirus Software Update

Answer: D

NEW QUESTION 20

Rick is the project manager of a construction project. He is in a process to procure some construction equipments. There are four vendors available for supplying the equipments. Rick does not want one of them to participate in the bidding as he has some personal grudges against the owner of the vendor. This is the violation of which of the following categories of the Project Management Institute Code of Ethics and Professional Conduct?

  • A. Respect
  • B. Honesty
  • C. Responsibility
  • D. Fairness

Answer: D

NEW QUESTION 21
......

100% Valid and Newest Version GISF Questions & Answers shared by Downloadfreepdf.net, Get Full Dumps HERE: https://www.downloadfreepdf.net/GISF-pdf-download.html (New 333 Q&As)