GISF Exam - GIAC Information Security Fundamentals

certleader.com

Act now and download your GIAC GISF test today! Do not waste time for the worthless GIAC GISF tutorials. Download Improved GIAC GIAC Information Security Fundamentals exam with real questions and answers and begin to learn GIAC GISF with a classic professional.

Online GIAC GISF free dumps demo Below:

NEW QUESTION 1

How should you configure USSOWA1 and USSTIME1 to allow secure access for remote employees?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose three.

  • A. Place USSTIME1 on the internal network
  • B. Place USSOWA1 on the internal network
  • C. Enable all connections from external network
  • D. Place USSTIME1 in a DMZ
  • E. Place USSOWA1 in a DMZ
  • F. Allow only TCP port 443 connections from the external network
  • G. Allow only TCP port 80 connections from the external network

Answer: DEF

NEW QUESTION 2

Which of the following are the types of Intrusion detection system?

  • A. Server-based intrusion detection system (SIDS)
  • B. Client based intrusion detection system (CIDS)
  • C. Host-based intrusion detection system (HIDS)
  • D. Network intrusion detection system (NIDS)

Answer: CD

NEW QUESTION 3

According to the case study, what protocol should be used to protect a customer's privacy and credit card information?
(Click the Exhibit button on the toolbar to see the case study.)

  • A. L2TP
  • B. FTP
  • C. HTTP
  • D. MS-CHAP
  • E. HTTPS
  • F. PPTP

Answer: E

NEW QUESTION 4

In which type of access control do user ID and password system come under?

  • A. Physical
  • B. Power
  • C. Technical
  • D. Administrative

Answer: C

NEW QUESTION 5

Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.

  • A. It is a digital representation of information that identifies users.
  • B. It uses asymmetric key pairs.
  • C. It provides security using data encryption and digital signature.
  • D. It uses symmetric key pairs.

Answer: BC

NEW QUESTION 6

Which of the following statements are true about TCP/IP model?
Each correct answer represents a complete solution. Choose all that apply.

  • A. It is consists of various protocols present in each layer.
  • B. It describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network.
  • C. It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.
  • D. It is generally described as having five abstraction layers.

Answer: ABC

NEW QUESTION 7

You work as the Network Administrator of TechJobs. You implement a security policy, to be in effect at all times, on the client computer in your network. While troubleshooting, assistant administrators often change security settings on the network. You want the security policy to be reapplied after changes have been made. How can you automate this task? (Click the Exhibit button on the toolbar to see the case study.)

  • A. Create a group policy object (GPO) and implement it to the domai
  • B. Configure a security policy on i
  • C. Give Administrators read-only permission on that GPO.
  • D. Create a separate OU for the Administrators to test the security settings.
  • E. Ask the assistant administrators to re-apply the security policy after the changes have been made.
  • F. Schedule the SECEDIT command to run on the client computers.

Answer: D

NEW QUESTION 8

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?
Each correct answer represents a complete solution. Choose two.

  • A. Boot sector
  • B. Multipartite
  • C. File
  • D. Stealth

Answer: AB

NEW QUESTION 9

Mark work as a Network Administrator for Roadways Travel Inc. The conmpany wants to implement a strategy for its external employees so that they can connect to Web based applications. What will Mark do to achieve this?
(Click the Exhibit button on the toolbar to see the case study.)

  • A. He will install a VPN server in the VLAN, Roadways, and an IIS server in the corporate LAN at the headquarters.
  • B. He will install a VPN server in the corporate LAN at the headquarters and an IIS server in the DMZ.
  • C. He will install a VPN server in the DMZ and an IIS server in the corporate LAN at the headquarters.
  • D. He will install a VPN server in the VLAN, Roadways, and an IIS server in the DMZ.

Answer: C

NEW QUESTION 10

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

  • A. Denial-of-Service
  • B. Eavesdropping
  • C. Spoofing
  • D. Packet manipulation

Answer: A

NEW QUESTION 11

Which of the following is an organization that defines standards for anti-virus software?

  • A. ICSA
  • B. IETF
  • C. IIS
  • D. IEEE

Answer: A

NEW QUESTION 12

You work as a Network Administrator for Tech World Inc. The company has a TCP/IP- based router. You have configured a router on your network. You want to accomplish the following goals:
l Configure the router to require a password to move from user EXEC mode to privileged EXEC mode.
l The password must be listed as a hidden entry in the configuration file. You run the following command: enable password <password>
Which of the goals will this action accomplish?

  • A. The password will be listed as a hidden entry in the configuration file
  • B. The action will accomplish neither of the goals
  • C. The action will accomplish both the goals
  • D. The router will require a password to move from user EXEC mode to privileged EXEC mode

Answer: D

NEW QUESTION 13

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

  • A. IPChains
  • B. OpenSSH
  • C. Stunnel
  • D. IPTables

Answer: D

NEW QUESTION 14

Which of the following federal laws are related to hacking activities? Each correct answer represents a complete solution. Choose three.

  • A. 18 U.S.
  • B. 1029
  • C. 18 U.S.
  • D. 1028
  • E. 18 U.S.
  • F. 1030
  • G. 18 U.S.
  • H. 2510

Answer: ACD

NEW QUESTION 15

You work as a Network Administrator for Infosec Inc. You find that not only have security applications running on the server, including software firewalls, anti-virus programs, and anti-spyware programs been disabled, but anti-virus and anti-spyware definitions have also been deleted. You suspect that this situation has arisen due to malware infection. Which of the following types of malware is the most likely cause of the issue?

  • A. Whack-A-Mole
  • B. FireKiller 2000
  • C. Beast
  • D. SubSeven

Answer: B

NEW QUESTION 16

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?
* 1. To account for all IT assets
* 2. To provide precise information support to other ITIL disciplines
* 3. To provide a solid base only for Incident and Problem Management
* 4. To verify configuration records and correct any exceptions

  • A. 2 and 4 only
  • B. 1, 3, and 4 only
  • C. 1, 2, and 4 only
  • D. 2, 3, and 4 only

Answer: C

NEW QUESTION 17

You want to ensure that everyone who sends you an email should encrypt it. However you do not wish to exchange individual keys with all people who send you emails. In order to accomplish this goal which of the following should you choose?

  • A. DES
  • B. AES
  • C. Symmetric Encryption
  • D. Public Key encryption

Answer: D

NEW QUESTION 18

Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult?

  • A. Multipartite virus
  • B. Polymorphic virus
  • C. Armored virus
  • D. Stealth virus

Answer: C

NEW QUESTION 19
......

Thanks for reading the newest GISF exam dumps! We recommend you to try the PREMIUM 2passeasy GISF dumps in VCE and PDF here: https://www.2passeasy.com/dumps/GISF/ (333 Q&As Dumps)