Top Replace GISF free exam Reviews!

It is impossible to pass GIAC GISF exam without any help in the short term. Come to Exambible soon and find the most advanced, correct and guaranteed GIAC GISF practice questions. You will get a surprising result by our Improved GIAC Information Security Fundamentals practice guides.

Q61. CORRECT TEXT 

Fill in the blank with the appropriate layer name. 

The Network layer of the OSI model corresponds to the  layer of the TCP/IP model. 

Answer: Internet 


Q62. Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam? 

Each correct answer represents a complete solution. Choose all that apply. 

A. Forward a copy of the spam to the ISP to make the ISP conscious of the spam. 

B. Send an email to the domain administrator responsible for the initiating IP address. 

C. Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message. 

D. Close existing email account and open new email account. 

Answer: A,C 


Q63. The new security policy requires you to encrypt all data transmitted from the laptop computers of sales personnel to the distribution centers. How will you implement the security requirements? 

(Click the Exhibit button on the toolbar to see the case study.) 

A. Use 40-bit encryption for Routing and Remote Access Service(RRAS) Server. Use PPTP without packet filtering for VPN. 

B. Use 128-bit encryption for Routing and Remote Access Service(RRAS) Server. Use PPTP without packet filtering for VPN. 

C. Use 128-bit encryption for Routing and Remote Access Service(RRAS) Server. Use PPTP with packet filtering for VPN. 

D. Use 40-bit encryption for the Routing and Remote Access Service(RRAS) Server. Use PPTP with packet filtering for VPN. 

Answer:


Q64. You are a Consumer Support Technician. You are helping a user troubleshoot computer-related issues. While troubleshooting the user's computer, you find a malicious program similar to a virus or worm. The program negatively affects the privacy and security of the computer and is capable of damaging the computer. Which of the following alert levels of Windows Defender is set for this program? 

A. Low 

B. High 

C. Severe 

D. Medium 

Answer:


Q65. Hardening a system is one of the practical methods of securing a computer system. Which of the following techniques is used for hardening a computer system? 

A. Applying Access Control List (ACL) 

B. Disabling all user accounts 

C. Applying a patch to the OS kernel 

D. Applying egress filtering 

Answer:


Q66. Your corporate network uses a Proxy Server for Internet access. The Manufacturing group has access permission for WWW protocol in the Web Proxy service, and access permission for POP3 protocol, in the WinSock Proxy service. The Supervisors group has access permission for WWW and FTP Read protocols in the Web Proxy service, and access permission for the SMTP protocol in the WinSock Proxy service. The Quality Control group has access permission only for WWW protocol in the Web Proxy service. The Interns group has no permissions granted in any of the Proxy Server services. Kate is a member of all four groups. In the Proxy Server services, which protocols does Kate have permission to use? 

A. WWW only 

B. FTP Read and SMTP only 

C. WWW, FTP Read, POP3, and SMTP 

D. WWW and POP3 only 

Answer:


Q67. Your company is going to add wireless connectivity to the existing LAN. You have concerns about the security of the wireless access and wish to implement encryption. Which of the following would be the best choice for you to use? 

A. WAP 

B. WEP 

C. DES 

D. PKI 

Answer:


Q68. According to the case study, what protocol should be used to protect a customer's privacy and credit card information? 

 (Click the Exhibit button on the toolbar to see the case study.) 

A. L2TP 

B. FTP 

C. HTTP 

D. MS-CHAP 

E. HTTPS 

F. PPTP 

Answer:


Q69. The SALES folder has a file named XFILE.DOC that contains critical information about your company. This folder resides on an NTFS volume. The company's Senior Sales Manager asks you to provide security for that file. You make a backup of that file and keep it in a locked cupboard, and then you deny access on the file for the Sales group. John, a member of the Sales group, accidentally deletes that file. You have verified that John is not a member of any other group. 

Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file. 

What is the most likely cause? 

A. The Sales group has the Full Control permission on the SALES folder. 

B. The Deny Access permission does not work on files. 

C. The Deny Access permission does not restrict the deletion of files. 

D. John is a member of another group having the Full Control permission on that file. 

Answer:


Q70. Which of the following processes is accountable for monitoring an IT Service and detecting when the performance drops beneath adequate limits? 

A. Service Asset and Configuration Management 

B. Service Request Management 

C. Event Management 

D. Service Level Management 

Answer: