GISF Exam - GIAC Information Security Fundamentals

certleader.com

Examcollection GISF Questions are updated and all GISF answers are verified by experts. Once you have completely prepared with our GISF exam prep kits you will be ready for the real GISF exam without a problem. We have Leading GIAC GISF dumps study guide. PASSED GISF First attempt! Here What I Did.

Also have GISF free dumps questions for you:

NEW QUESTION 1

Which of the following can be used to prevent routing loops in distance vector routing protocols?
Each correct answer represents a complete solution. Choose two.

  • A. Split horizon
  • B. Link-state advertisement
  • C. Spanning Tree Protocol
  • D. Hold-down timers

Answer: AD

NEW QUESTION 2

Which of the following provide data confidentiality services by encrypting the data sent between wireless systems?
Each correct answer represents a complete solution. Choose two.

  • A. MS-CHAP v2
  • B. WEP
  • C. PAP
  • D. WPA

Answer: BC

NEW QUESTION 3

You work as an Application Developer for uCertify Inc. The company uses Visual Studio
.NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?

  • A. Kerberos
  • B. HTTPS
  • C. RSA
  • D. IPSEC

Answer: B

NEW QUESTION 4

Which of the following roles is used to ensure that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

  • A. The Service Level Manager
  • B. The Configuration Manager
  • C. The IT Security Manager
  • D. The Change Manager

Answer: C

NEW QUESTION 5

Which of the following tools can be used to perform tasks such as Windows password cracking Windows enumeration, and VoIP session sniffing?

  • A. John the Ripper
  • B. Obiwan
  • C. Cain
  • D. L0phtcrack

Answer: C

NEW QUESTION 6

Based on the case study, to implement more security, which of the following additional technologies should you implement for laptop computers?
(Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose two.

  • A. Encrypted Data Transmissions
  • B. Digital certificates
  • C. Two-factor authentication
  • D. PAP authentication
  • E. Encrypting File System (EFS)

Answer: BE

NEW QUESTION 7

You are concerned about outside attackers penetrating your network via your company Web server.
You wish to place your Web server between two firewalls One firewall between the Web server and the outside world The other between the Web server and your network
What is this called?

  • A. IDS
  • B. SPI firewall
  • C. DMZ
  • D. Application Gateway firewall

Answer: C

NEW QUESTION 8

The workstations on your network utilize Windows XP (service pack 2 or later). Many users
take their laptops on the road. You are very concerned about the security and want to have a robust firewall solution for mobile users. You have decided that all your firewalls to use the Stateful Packet Inspection (SPI) method. What must you do to provide SPI to your mobile users?

  • A. You must purchase a third party firewall solution for your mobile users.
  • B. Do nothin
  • C. Windows XP service pack 2 has a firewall turned on by default.
  • D. Download the SPI template from Microsoft.
  • E. Configure the Windows XP firewall to use SPI.

Answer: A

NEW QUESTION 9

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.
The tool uses raw IP packets to determine the following:
What ports are open on our network systems. What hosts are available on the network. Identify unauthorized wireless access points.
What services (application name and version) those hosts are offering. What operating systems (and OS versions) they are running.
What type of packet filters/firewalls are in use. Which of the following tools is Victor using?

  • A. Nessus
  • B. Kismet
  • C. Nmap
  • D. Sniffer

Answer: C

NEW QUESTION 10

You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?

  • A. Reset Account Lockout Counter After policy
  • B. Set Account Lockout Threshold policy
  • C. Enforce Password Must Meet Complexity Requirements policy
  • D. Set Account Lockout Duration policy

Answer: B

NEW QUESTION 11

Mark works as a Network Administrator for NetTech Inc. The network uses routers from multiple vendors. Mark wants to implement a routing protocol on the company's network that provides VLSM support, scalability and minimal overhead on the network. Which of the following protocols will Mark use to fulfill the requirements?

  • A. RIPv1
  • B. EIGRP
  • C. CDP
  • D. OSPF

Answer: D

NEW QUESTION 12

Which of the following is a valid IP address for class B Networks?

  • A. 172.157.88.3
  • B. 80.33.5.7
  • C. 212.136.45.8
  • D. 225.128.98.7

Answer: A

NEW QUESTION 13

Mark works as a Customer Support Technician for uCertify Inc. The company provides troubleshooting support to users. Mark is troubleshooting a computer of a user who is working on Windows Vista. The user reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center should Mark configure to save the user's data?

  • A. Automatic updating
  • B. Firewall
  • C. Malware protection
  • D. Content Advisor

Answer: A

NEW QUESTION 14

Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Address Resolution Protocol (ARP)
  • B. Network Link Protocol (NWLink)
  • C. User Datagram Protocol (UDP)
  • D. Internet Control Message Protocol (ICMP)

Answer: ACD

NEW QUESTION 15

Which of the following statements are true about Dsniff?
Each correct answer represents a complete solution. Choose two.

  • A. It is a virus.
  • B. It contains Trojans.
  • C. It is antivirus.
  • D. It is a collection of various hacking tools.

Answer: BD

NEW QUESTION 16

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

  • A. Cross-Site Request Forgery
  • B. Code injection attack
  • C. Cross-Site Scripting attack
  • D. Command injection attack

Answer: B

NEW QUESTION 17

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

  • A. Smurf DoS attack
  • B. Teardrop attack
  • C. Fraggle DoS attack
  • D. Ping flood attack

Answer: C

NEW QUESTION 18

Which of the following is the primary function of VPNs?

  • A. To establish private connections over public networks
  • B. To make virtual connections for remote access
  • C. To establish a wireless connections to networks
  • D. To access networks remotely

Answer: A

NEW QUESTION 19
......

P.S. Easily pass GISF Exam with 333 Q&As DumpSolutions.com Dumps & pdf Version, Welcome to Download the Newest DumpSolutions.com GISF Dumps: https://www.dumpsolutions.com/GISF-dumps/ (333 New Questions)