GISF Exam - GIAC Information Security Fundamentals

certleader.com

Act now and download your GIAC GISF test today! Do not waste time for the worthless GIAC GISF tutorials. Download Avant-garde GIAC GIAC Information Security Fundamentals exam with real questions and answers and begin to learn GIAC GISF with a classic professional.

Online GIAC GISF free dumps demo Below:

NEW QUESTION 1

The method used to encrypt messages by transposing or scrambling the characters in a certain manner is known as ______.

  • A. Quantum cipher
  • B. Transposition cipher
  • C. Hybrid systems
  • D. Mathematical cipher
  • E. Substitution cipher
  • F. Steganography

Answer: B

NEW QUESTION 2

You are the Administrator for a corporate network. You are concerned about denial of service attacks. Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

  • A. Shorten the timeout for connection attempts.
  • B. Place a honey pot in the DMZ.
  • C. Implement a strong password policy.
  • D. Implement network based antivirus.

Answer: A

NEW QUESTION 3

You are the project manager of a new project in your organization. You and the project team have identified the project risks, completed risk analysis, and are planning the most appropriate risk responses. Which of the following tools is most effective to choose the most appropriate risk response?

  • A. Project network diagrams
  • B. Delphi Technique
  • C. Decision tree analysis
  • D. Cause-and-effect diagrams

Answer: C

NEW QUESTION 4

Which of the following are the goals of the cryptographic systems? Each correct answer represents a complete solution. Choose three.

  • A. Availability
  • B. Authentication
  • C. Confidentiality
  • D. Integrity

Answer: BCD

NEW QUESTION 5

Andrew works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains five Windows 2008 member servers and 120 Windows XP Professional client computers. Andrew is concerned about the member servers that are not meeting the security requirements as mentioned in the security policy of the company. Andrew wants to compare the current security settings of the member servers with the security template that is configured according to the security policy of the company. Which of the following tools will Andrew use to accomplish this?

  • A. Security Configuration and Analysis Tool
  • B. Active Directory Migration Tool (ADMT)
  • C. Task Manager
  • D. Group Policy Management Console (GPMC)

Answer: A

NEW QUESTION 6

Security is responsible for well-being of information and infrastructures in which the
possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Availability
  • B. Confidentiality
  • C. Confidentiality
  • D. Authenticity

Answer: ABCD

NEW QUESTION 7

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

  • A. Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer
  • B. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer
  • C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
  • D. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

Answer: D

NEW QUESTION 8

Which of the following processes is responsible for low risk, frequently occurring low cost changes?

  • A. Incident Management
  • B. IT Facilities Management
  • C. Request Fulfillment
  • D. Release Management

Answer: C

NEW QUESTION 9

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

  • A. Organizing a solution to remove an incident
  • B. Building up an incident response kit
  • C. Working with QA to validate security of the enterprise
  • D. Setting up the initial position after an incident

Answer: B

NEW QUESTION 10

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host?

  • A. Blackbox testing
  • B. Firewalking
  • C. Brainstorming
  • D. Port redirection

Answer: D

NEW QUESTION 11

Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?

  • A. Eavesdropping
  • B. Intrusion
  • C. Dialler attack
  • D. Denial of service

Answer: A

NEW QUESTION 12

Which of the following U.S.C. laws is governs the fraudulent activities associated with computers?

  • A. 18 U.S.
  • B. 2251
  • C. 18 U.S.
  • D. 3771
  • E. 18 U.S.
  • F. 2257
  • G. 18 U.S.
  • H. 1030

Answer: D

NEW QUESTION 13

You send and receive messages on Internet. A man-in-the-middle attack can be performed to capture and read your message. Which of the following Information assurance pillars ensures the security of your message or data against this type of attack?

  • A. Authentication
  • B. Non-repudiation
  • C. Data availability
  • D. Confidentiality

Answer: D

NEW QUESTION 14

You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

  • A. SHA
  • B. AES
  • C. MD5
  • D. DES

Answer: C

NEW QUESTION 15

Which of the following components are usually found in an Intrusion detection system (IDS)?
Each correct answer represents a complete solution. Choose two.

  • A. Console
  • B. Sensor
  • C. Firewall
  • D. Modem
  • E. Gateway

Answer: AB

NEW QUESTION 16

Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?

  • A. NetBus
  • B. EliteWrap
  • C. Trojan Man
  • D. Tiny

Answer: C

NEW QUESTION 17

Which of the following algorithms produce 160-bit hash values? Each correct answer represents a complete solution. Choose two.

  • A. MD2
  • B. MD5
  • C. SHA-1
  • D. SHA-0

Answer: CD

NEW QUESTION 18

Mark is implementing security on his e-commerce site. He wants to ensure that a customer sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?

  • A. Packet filtering
  • B. Authentication
  • C. Firewall
  • D. Digital signature

Answer: D

NEW QUESTION 19
......

P.S. Certleader now are offering 100% pass ensure GISF dumps! All GISF exam questions have been updated with correct answers: https://www.certleader.com/GISF-dumps.html (333 New Questions)