aiotestking uk

GISF Exam Questions - Online Test


GISF Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Virtual of GISF question materials and exam answers for GIAC certification for IT examinee, Real Success Guaranteed with Updated GISF pdf dumps vce Materials. 100% PASS GIAC Information Security Fundamentals exam Today!

Check GISF free dumps before getting the full version:

NEW QUESTION 1

Which of the following processes is responsible for low risk, frequently occurring low cost changes?

  • A. Incident Management
  • B. IT Facilities Management
  • C. Request Fulfillment
  • D. Release Management

Answer: C

NEW QUESTION 2

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

  • A. Authentication
  • B. Confidentiality
  • C. Integrity
  • D. Non-repudiation

Answer: B

NEW QUESTION 3

You are a Consumer Support Technician. You are helping a user troubleshoot computer- related issues. While troubleshooting the user's computer, you find a malicious program similar to a virus or worm. The program negatively affects the privacy and security of the computer and is capable of damaging the computer. Which of the following alert levels of Windows Defender is set for this program?

  • A. Low
  • B. High
  • C. Severe
  • D. Medium

Answer: C

NEW QUESTION 4

You work as a Software Developer for Mansoft Inc. You, together with a team, develop a distributed application that processes orders from multiple types of clients. The application uses SQL Server to store data for all orders. The application does not implement any custom performance counters. After the application is deployed to production, it must be monitored for performance spikes. What will you do to monitor performance spikes in the application in a deployment environment?
Each correct answer represents a part of the solution. Choose all that apply.

  • A. Use SQL Profiler
  • B. Use CLR Profiler
  • C. Use Windows System Monitor
  • D. Use Microsoft Operations Manager

Answer: ACD

NEW QUESTION 5

Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult?

  • A. Multipartite virus
  • B. Polymorphic virus
  • C. Armored virus
  • D. Stealth virus

Answer: C

NEW QUESTION 6

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want to the information security policies.
Which of the following are its significant steps?
Each correct answer represents a complete solution. Choose two.

  • A. Awareness and Training Material Effectiveness
  • B. Awareness and Training Material Development
  • C. Awareness and Training Material Implementation
  • D. Awareness and Training Program Design

Answer: BD

NEW QUESTION 7

Which of the following encryption techniques does digital signatures use?

  • A. MD5
  • B. RSA
  • C. IDEA
  • D. Blowfish

Answer: C

NEW QUESTION 8

Which of the following statements about Secure Shell (SSH) are true? Each correct answer represents a complete solution. Choose three.

  • A. It was designed as a replacement for TELNET and other insecure shells.
  • B. It is a network protocol used primarily on Linux and Unix based systems.
  • C. It allows data to be exchanged using a secure channel between two networked devices.
  • D. It is the core routing protocol of the Internet.

Answer: ABC

NEW QUESTION 9

You are the project manager of the HHH Project. The stakeholders for this project are scattered across the world and you need a method to promote interaction. You determine that a Web conferencing software would be the most cost effective solution. The stakeholders can watch a slide show while you walk them through the project details. The stakeholders can hear you, ask questions via a chat software, and post concerns. What is the danger in this presentation?

  • A. 55 percent of all communication is nonverbal and this approach does not provide non- verbal communications.
  • B. The technology is not proven as reliable.
  • C. The stakeholders won't really see you.
  • D. The stakeholders are not required to attend the entire session.

Answer: A

NEW QUESTION 10

Which of the following monitors program activities and modifies malicious activities on a system?

  • A. Back door
  • B. HIDS
  • C. RADIUS
  • D. NIDS

Answer: B

NEW QUESTION 11

Mark works as a Customer Support Technician for uCertify Inc. The company provides troubleshooting support to users. Mark is troubleshooting a computer of a user who is working on Windows Vista. The user reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center should Mark configure to save the user's data?

  • A. Automatic updating
  • B. Firewall
  • C. Malware protection
  • D. Content Advisor

Answer: A

NEW QUESTION 12

Which of the following are used as primary technologies to create a layered defense for giving protection to a network?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Vulnerability
  • B. Firewall
  • C. Endpoint authentication
  • D. IDS

Answer: BCD

NEW QUESTION 13

Tom and Gary are in a debate over which software should be purchased as part of their project. Gary tells Tom that because he's the senior software developer and has been with the company for 12 years, he'll be making the decision on the software. What type of conflict resolution has happened in this instance?

  • A. Avoiding
  • B. Forcing
  • C. Compromising
  • D. Smoothing

Answer: B

NEW QUESTION 14

You are a Product manager of Marioxiss Inc. Your company management is having a conflict with another company Texasoftg Inc. over an issue of security policies. Your legal advisor has prepared a document that includes the negotiation of views for both the companies. This solution is supposed to be the key for conflict resolution. Which of the following are the forms of conflict resolution that have been employed by the legal advisor?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Orientation
  • B. Mediation
  • C. Negotiation
  • D. Arbitration

Answer: BCD

NEW QUESTION 15

Which of the following is an examination of the controls within an Information technology (IT) infrastructure?

  • A. Risk analysis
  • B. ITIL
  • C. ADP audit
  • D. SMART

Answer: C

NEW QUESTION 16

Which project management risk event would you be using if you changed the sequence of activities to reduce the probability of the project being delayed?

  • A. Enhancing
  • B. Withdrawal
  • C. Exploiting
  • D. Avoidance

Answer: D

NEW QUESTION 17

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

  • A. Quantitative analysis
  • B. Qualitative analysis
  • C. Estimate activity duration
  • D. Risk identification

Answer: B

NEW QUESTION 18
......

Thanks for reading the newest GISF exam dumps! We recommend you to try the PREMIUM DumpSolutions.com GISF dumps in VCE and PDF here: https://www.dumpsolutions.com/GISF-dumps/ (333 Q&As Dumps)