A Review Of Virtual GISF preparation exams

Proper study guides for Replace GIAC GIAC Information Security Fundamentals certified begins with GIAC GISF preparation products which designed to deliver the Printable GISF questions by making you pass the GISF test at your first time. Try the free GISF demo right now.

Q81. Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer? 

Each correct answer represents a complete solution. Choose two. 

A. Attacker can use the Ping Flood DoS attack if WZC is used. 

B. Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access. 

C. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access. 

D. It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network. 

Answer: B,C 

Q82. Which of the following statements are true about Dsniff? 

Each correct answer represents a complete solution. Choose two. 

A. It is a virus. 

B. It contains Trojans. 

C. It is antivirus. 

D. It is a collection of various hacking tools. 

Answer: B,D 

Q83. The security of a computer against the unauthorized usage largely depends upon the efficiency of the applied access control method. Which of the following statements are true about a computer access control method? 

Each correct answer represents a complete solution. Choose all that apply. 

A. It can be based upon fingerprint or eye recognition. 

B. It can be time-synchronous. 

C. It provides security against the virus attacks. 

D. It provides security against Eavesdropping. 

E. It checks the authenticity of a person. 

F. It is used to encrypt a message before transmitting it on a network. 

Answer: A,B,E 

Q84. You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues? 

A. Use Incident handling 

B. Use OODA loop 

C. Use SMART model 

D. Use Information assurance 


Q85. The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk? 

Each correct answer represents a complete solution. Choose two. 

A. Boot sector 

B. Multipartite 

C. File 

D. Stealth 

Answer: A,B 

Q86. Which of the following is not needed for effective procurement planning? 

A. Activity resource management 

B. Project schedule 

C. Cost baseline 

D. Quality risk analysis 


Q87. You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this? 

A. Eavesdropping 

B. Spoofing 

C. Denial-of-Service 

D. Packet manipulation 


Q88. What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise? 

A. The application layer port numbers and the transport layer headers 

B. The presentation layer headers and the session layer port numbers 

C. The network layer headers and the session layer port numbers 

D. The transport layer port numbers and the application layer headers 


Q89. You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista. 

He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data? 

A. Malware protection 

B. Automatic updating 

C. Firewall 

D. Other security settings 


Q90. You are the project manager of a new project in your organization. You and the project team have identified the project risks, completed risk analysis, and are planning the most appropriate risk responses. Which of the following tools is most effective to choose the most appropriate risk response? 

A. Project network diagrams 

B. Delphi Technique 

C. Decision tree analysis 

D. Cause-and-effect diagrams