Proper study guides for Avant-garde GIAC GIAC Information Security Fundamentals certified begins with GIAC GISF preparation products which designed to deliver the Validated GISF questions by making you pass the GISF test at your first time. Try the free GISF demo right now.
GIAC GISF Free Dumps Questions Online, Read and Test Now.
NEW QUESTION 1
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?
Answer: D
NEW QUESTION 2
You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?
Answer: A
NEW QUESTION 3
Which of the following are the differences between routed protocols and routing protocols?
Each correct answer represents a complete solution. Choose two.
Answer: BC
NEW QUESTION 4
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?
Answer: D
NEW QUESTION 5
Which of the following provide data confidentiality services by encrypting the data sent between wireless systems?
Each correct answer represents a complete solution. Choose two.
Answer: BC
NEW QUESTION 6
Firekiller 2000 is an example of a _____.
Answer: D
NEW QUESTION 7
Which of the following are the benefits of information classification for an organization?
Answer: AC
NEW QUESTION 8
John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80.
Which of the following attacking methods can he use to send the dangerous software protocols?
Answer: A
NEW QUESTION 9
You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.
He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?
Answer: C
NEW QUESTION 10
Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?
Answer: C
NEW QUESTION 11
In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?
Answer: D
NEW QUESTION 12
Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ABD
NEW QUESTION 13
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows 2008 member servers and 250 Windows Vista client computers. One of the member servers works as a Web server that hosts an intranet Web site. According to the company security policy, Mark needs to fulfill the following requirements:
* 1. Encryption should be used for authentication of all traffic to the Web site.
* 2. SSL should not be used on the Web server for performance reasons.
* 3. Users should be authenticated using their Active Directory credentials.
In order to fulfill the requirements, Mark has disabled the Anonymous Authentication setting on the server. What else does he have to do?
Answer: CD
NEW QUESTION 14
Which of the following protocols is used to prevent switching loops in networks with
redundant switched paths?
Answer: B
NEW QUESTION 15
Cryptography is the science of?
Answer: A
NEW QUESTION 16
Which of the following options cannot be accessed from Windows Update?
Answer: D
NEW QUESTION 17
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you want to apply Windows firewall setting to all the computers in the domain to improve security.
Which of the following is the fastest and the most effective way to accomplish the task?
Answer: C
NEW QUESTION 18
......
P.S. Easily pass GISF Exam with 333 Q&As DumpSolutions.com Dumps & pdf Version, Welcome to Download the Newest DumpSolutions.com GISF Dumps: https://www.dumpsolutions.com/GISF-dumps/ (333 New Questions)