aiotestking uk

GISF Exam Questions - Online Test


GISF Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Proper study guides for Avant-garde GIAC GIAC Information Security Fundamentals certified begins with GIAC GISF preparation products which designed to deliver the Validated GISF questions by making you pass the GISF test at your first time. Try the free GISF demo right now.

GIAC GISF Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?

  • A. Configure Network address translation (NAT).
  • B. Disable Windows firewall logging.
  • C. Configure Internet Protocol Security (IPSec).
  • D. Enable Windows firewall logging.

Answer: D

NEW QUESTION 2

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

  • A. Antivirus log
  • B. System log
  • C. IDS log
  • D. Firewall log

Answer: A

NEW QUESTION 3

Which of the following are the differences between routed protocols and routing protocols?
Each correct answer represents a complete solution. Choose two.

  • A. A routing protocol is configured on an interface and decides the method of packet delivery.
  • B. A routing protocol decides the path for a packet through the network.
  • C. A routed protocol is configured on an interface and decides how a packet will be delivered.
  • D. A routed protocol works on the transport layer of the OSI model.

Answer: BC

NEW QUESTION 4

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

  • A. Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer
  • B. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer
  • C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
  • D. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

Answer: D

NEW QUESTION 5

Which of the following provide data confidentiality services by encrypting the data sent between wireless systems?
Each correct answer represents a complete solution. Choose two.

  • A. MS-CHAP v2
  • B. WEP
  • C. PAP
  • D. WPA

Answer: BC

NEW QUESTION 6

Firekiller 2000 is an example of a _____.

  • A. DoS attack Trojan
  • B. Data sending Trojan
  • C. Remote access Trojan
  • D. Security software disabler Trojan

Answer: D

NEW QUESTION 7

Which of the following are the benefits of information classification for an organization?

  • A. It helps identify which information is the most sensitive or vital to an organization.
  • B. It ensures that modifications are not made to data by unauthorized personnel or processes
  • C. It helps identify which protections apply to which information.
  • D. It helps reduce the Total Cost of Ownership (TCO).

Answer: AC

NEW QUESTION 8

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80.
Which of the following attacking methods can he use to send the dangerous software protocols?

  • A. HTTP tunneling
  • B. URL obfuscation
  • C. Banner grabbing
  • D. MAC spoofing

Answer: A

NEW QUESTION 9

You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.
He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?

  • A. Malware protection
  • B. Automatic updating
  • C. Firewall
  • D. Other security settings

Answer: C

NEW QUESTION 10

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

  • A. A DNS Zone
  • B. An Intranet
  • C. A demilitarized zone (DMZ)
  • D. A stub zone

Answer: C

NEW QUESTION 11

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

  • A. Bandwidth
  • B. Load
  • C. Delay
  • D. Frequency

Answer: D

NEW QUESTION 12

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Slack space
  • B. Unused Sectors
  • C. Dumb space
  • D. Hidden partition

Answer: ABD

NEW QUESTION 13

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows 2008 member servers and 250 Windows Vista client computers. One of the member servers works as a Web server that hosts an intranet Web site. According to the company security policy, Mark needs to fulfill the following requirements:
* 1. Encryption should be used for authentication of all traffic to the Web site.
* 2. SSL should not be used on the Web server for performance reasons.
* 3. Users should be authenticated using their Active Directory credentials.
In order to fulfill the requirements, Mark has disabled the Anonymous Authentication setting on the server. What else does he have to do?

  • A. Enable the Anonymous Authentication setting on the server.
  • B. Enable the Encrypting File System (EFS) on the server.
  • C. Enable the Digest Authentication setting on the server.
  • D. Enable the Windows Authentication setting on the server.

Answer: CD

NEW QUESTION 14

Which of the following protocols is used to prevent switching loops in networks with
redundant switched paths?

  • A. Cisco Discovery Protocol (CDP)
  • B. Spanning Tree Protocol (STP)
  • C. File Transfer Protocol (FTP)
  • D. VLAN Trunking Protocol (VTP)

Answer: B

NEW QUESTION 15

Cryptography is the science of?

  • A. Encrypting and decrypting plain text messages.
  • B. Decrypting encrypted text messages.
  • C. Encrypting plain text messages.
  • D. Hacking secure information.

Answer: A

NEW QUESTION 16

Which of the following options cannot be accessed from Windows Update?

  • A. Restore Hidden Updates
  • B. Check for Updates
  • C. View Update History
  • D. View AntiVirus Software Update

Answer: D

NEW QUESTION 17

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you want to apply Windows firewall setting to all the computers in the domain to improve security.
Which of the following is the fastest and the most effective way to accomplish the task?

  • A. Apply firewall settings manually.
  • B. Apply firewall settings on the domain controller of the domain.
  • C. Use group policy to apply firewall settings.
  • D. Use a batch file to apply firewall setting.

Answer: C

NEW QUESTION 18
......

P.S. Easily pass GISF Exam with 333 Q&As DumpSolutions.com Dumps & pdf Version, Welcome to Download the Newest DumpSolutions.com GISF Dumps: https://www.dumpsolutions.com/GISF-dumps/ (333 New Questions)