The Improve Guide To GISF training tools Jan 2021

Want to know Actualtests GISF Exam practice test features? Want to lear more about GIAC GIAC Information Security Fundamentals certification experience? Study High value GIAC GISF answers to Latest GISF questions at Actualtests. Gat a success with an absolute guarantee to pass GIAC GISF (GIAC Information Security Fundamentals) test on your first attempt.

Q11. Which of the following refers to the emulation of the identity of a network computer by an attacking computer? 

A. Spoofing 

B. PING attack 

C. Hacking 

D. SYN attack 


Q12. Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host? 

A. Blackbox testing 

B. Firewalking 

C. Brainstorming 

D. Port redirection 


Q13. A Cisco Unified Wireless Network has an AP that does not rely on the central control device of the network. Which type of AP has this characteristic? 

A. Lightweight AP 

B. Rogue AP 


D. Autonomous AP 


Q14. Which of the following statements about Encapsulating Security Payload (ESP) are true? 

Each correct answer represents a complete solution. Choose two. 

A. It can also be nested with the Layer Two Tunneling Protocol (L2TP). 

B. It is an IPSec protocol. 

C. It is a text-based communication protocol. 

D. It uses TCP port 22 as the default port and operates at the application layer. 

Answer: A,B 

Q15. Under the SMART scheme, the Predictive Failure Analysis Technology is used to determine the failure or crash for which of the following parts of a computer system? 

A. Operating System 

B. Hard Disc drive 

C. Software 

D. Internet Browser 


Q16. You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. The messaging organization contains one Hub Transport server, one Client Access server, and two Mailbox servers. 

You are planning to deploy an Edge Transport server in your messaging organization to minimize the attack surface. At which of the following locations will you deploy the Edge Transport server? 

A. Active Directory site 

B. Intranet 

C. Behind the inner firewall of an organization 

D. Perimeter network 


Q17. Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet? 

A. Risk analysis 

B. Firewall security 

C. OODA loop 

D. Cryptography 


Q18. Which of the following protocols can help you get notified in case a router on a network fails? 






Q19. Which of the following are the examples of administrative controls? 

Each correct answer represents a complete solution. Choose all that apply. 

A. Data Backup 

B. Security policy 

C. Security awareness training 

D. Auditing 

Answer: B,C 

Q20. You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control? 

A. Quantitative risk analysis 

B. Risk audits 

C. Qualitative risk analysis 

D. Requested changes