aiotestking uk

GISF Exam Questions - Online Test


GISF Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Proper study guides for Far out GIAC GIAC Information Security Fundamentals certified begins with GIAC GISF preparation products which designed to deliver the Vivid GISF questions by making you pass the GISF test at your first time. Try the free GISF demo right now.

Also have GISF free dumps questions for you:

NEW QUESTION 1

Which of the following categories of the network management model is used to detect and log network problems or device failures?

  • A. Fault Management
  • B. Configuration Management
  • C. Security Management
  • D. Performance Management

Answer: A

NEW QUESTION 2
CORRECT TEXT
Fill in the blank with the appropriate value. SHA-1 produces a _____ -bit message digest.


Solution:
SHA-1 produces a160-bit message digest

Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 3

You are the program manager of the BHG Program. One of the projects in your program will be using new materials that are somewhat untested. You are worried that there may be delays and waste because the project team is unaware of how to accurately use these materials. You elect to send the people that will be using the new materials through training on how to complete their project work. You also allow them to purchase some of the materials to experiment on their use before the actual project work is to be done. You want to ensure that mistakes do not enter into the project. What type of action have you provided in this scenario?

  • A. This is an example of team development.
  • B. This is an example of a corrective action.
  • C. This is an example of quality assurance.
  • D. This is an example of a preventive action.

Answer: D

NEW QUESTION 4

Which of the following devices or hardware parts employs SMART model system as a monitoring system?

  • A. Modem
  • B. RAM
  • C. Hard disk
  • D. IDS

Answer: C

NEW QUESTION 5

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

  • A. A risk probability-impact matrix
  • B. Quantitative risk analysis
  • C. Qualitative risk analysis
  • D. Seven risk responses

Answer: C

NEW QUESTION 6

Which of the following statements about Public Key Infrastructure (PKI) is true?

  • A. It uses symmetric key pairs.
  • B. It uses public key encryption.
  • C. It is a digital representation of information that identifies users.
  • D. It provides security using data encryption and digital signature.

Answer: D

NEW QUESTION 7

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?

  • A. Biometric devices
  • B. Intrusion detection systems
  • C. Key card
  • D. CCTV Cameras

Answer: D

NEW QUESTION 8

What is VeriSign?

  • A. It is a data warehouse.
  • B. It is an e-commerce portal.
  • C. It is a search engine.
  • D. It is a payment gateway.

Answer: D

NEW QUESTION 9

You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?

  • A. Examining your firewall logs
  • B. Examining your DNS Server logs
  • C. Examining your domain controller server logs
  • D. Examining your antivirus logs

Answer: A

NEW QUESTION 10

TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?

  • A. Windows
  • B. Red Hat
  • C. Solaris
  • D. Knoppix

Answer: A

NEW QUESTION 11

Which of the following refers to encrypted text?

  • A. Plaintext
  • B. Cookies
  • C. Ciphertext
  • D. Hypertext

Answer: C

NEW QUESTION 12

Your network utilizes a coax cable for connections between various network segments. Your predecessor made sure none of the coax cables were in an exposed area that could easily be accessed. This caused the use of significant extra cabling. Why do you think this was done?

  • A. This was an error you should correc
  • B. It wastes the cable and may make maintenance more difficult.
  • C. He was concerned about wireless interception of data.
  • D. He was concerned about electromagnetic emanation being used to gather data.
  • E. He was concerned about vampire taps.

Answer: D

NEW QUESTION 13

Which of the following attacks saturates network resources and disrupts services to a
specific computer?

  • A. Teardrop attack
  • B. Replay attack
  • C. Denial-of-Service (DoS) attack
  • D. Polymorphic shell code attack

Answer: C

NEW QUESTION 14

Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?

  • A. NetBus
  • B. EliteWrap
  • C. Trojan Man
  • D. Tiny

Answer: C

NEW QUESTION 15

Mark is implementing security on his e-commerce site. He wants to ensure that a customer
sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?

  • A. Authentication
  • B. Firewall
  • C. Packet filtering
  • D. Digital signature

Answer: D

NEW QUESTION 16

Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?

  • A. Asymmetric
  • B. Symmetric
  • C. Numeric
  • D. Hashing

Answer: B

NEW QUESTION 17

Which of the following are the types of access controls?
Each correct answer represents a complete solution. Choose three.

  • A. Physical
  • B. Administrative
  • C. Automatic
  • D. Technical

Answer: ABD

NEW QUESTION 18
......

Thanks for reading the newest GISF exam dumps! We recommend you to try the PREMIUM Allfreedumps.com GISF dumps in VCE and PDF here: https://www.allfreedumps.com/GISF-dumps.html (333 Q&As Dumps)