Exam Code: GISF (Practice Exam Latest Test Questions VCE PDF)
Exam Name: GIAC Information Security Fundamentals
Certification Provider: GIAC
Free Today! Guaranteed Training- Pass GISF Exam.
Check GISF free dumps before getting the full version:
NEW QUESTION 1
You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?
Answer: B
NEW QUESTION 2
You have an antivirus program for your network. It is dependent upon using lists of known viruses. What is this type of scan called?
Answer: C
NEW QUESTION 3
Which of the following statements are true about UDP?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ACD
NEW QUESTION 4
Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions, which is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ACD
NEW QUESTION 5
You are configuring the Terminal service. What Protocols are required with Terminal services? (Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a part of the solution. Choose two.
Answer: BC
NEW QUESTION 6
Which of the following protocols are used by Network Attached Storage (NAS)?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ABC
NEW QUESTION 7
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.
Answer: ACD
NEW QUESTION 8
You work as a Network Administrator for ABC Inc. The company has a secure wireless network.
However, in the last few days, an attack has been taking place over and over again. This attack is taking advantage of ICMP directed broadcast. To stop this attack, you need to disable ICMP directed broadcasts. Which of the following attacks is taking place?
Answer: A
NEW QUESTION 9
Which of the following types of firewalls looks deep into packets and makes granular access control decisions?
Answer: B
NEW QUESTION 10
You work as a Software Developer for Mansoft Inc. You, together with a team, develop a distributed application that processes orders from multiple types of clients. The application uses SQL Server to store data for all orders. The application does not implement any custom performance counters. After the application is deployed to production, it must be monitored for performance spikes. What will you do to monitor performance spikes in the application in a deployment environment?
Each correct answer represents a part of the solution. Choose all that apply.
Answer: ACD
NEW QUESTION 11
Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?
Answer: B
NEW QUESTION 12
You want to install a server that can be accessed by external users. You also want to ensure that these users cannot access the rest of the network. Where will you place the server?
Answer: D
NEW QUESTION 13
Cryptography is the science of?
Answer: A
NEW QUESTION 14
You are the project manager of SST project. You are in the process of collecting and distributing performance information including status report, progress measurements, and forecasts. Which of the following process are you performing?
Answer: C
NEW QUESTION 15
You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company's network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?
Answer: A
NEW QUESTION 16
Which of the following are used as primary technologies to create a layered defense for giving protection to a network?
Each correct answer represents a complete solution. Choose all that apply.
Answer: BCD
NEW QUESTION 17
Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?
Answer: A
NEW QUESTION 18
What are the benefits of using a proxy server on a network?
Each correct answer represents a complete solution. Choose all that apply.
Answer: AB
NEW QUESTION 19
......
Recommend!! Get the Full GISF dumps in VCE and PDF From Surepassexam, Welcome to Download: https://www.surepassexam.com/GISF-exam-dumps.html (New 333 Q&As Version)