aiotestking uk

GISF Exam Questions - Online Test


GISF Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Validated of GISF rapidshare materials and sample question for GIAC certification for IT professionals, Real Success Guaranteed with Updated GISF pdf dumps vce Materials. 100% PASS GIAC Information Security Fundamentals exam Today!

Also have GISF free dumps questions for you:

NEW QUESTION 1

Which of the following service provider classes is used to create a digital signature?

  • A. RC2CryptoServiceProvider
  • B. RNGCryptoServiceProvider
  • C. DESCryptoServiceProvider
  • D. SHA1CryptoServiceProvider
  • E. MD5CryptoServiceProvider
  • F. DSACryptoServiceProvider

Answer: F

NEW QUESTION 2

You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

  • A. Vertical Privilege Escalation
  • B. Session Hijacking
  • C. Account hijacking
  • D. Horizontal Privilege Escalation

Answer: D

NEW QUESTION 3

You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?

  • A. Network Based
  • B. Dictionary
  • C. Heuristic
  • D. Host based

Answer: C

NEW QUESTION 4

Which of the following firewalls operates at three layers- Layer3, Layer4, and Layer5?

  • A. Circuit-level firewall
  • B. Application layer firewall
  • C. Proxy firewall
  • D. Dynamic packet-filtering firewall

Answer: D

NEW QUESTION 5

Your corporate network uses a Proxy Server for Internet access. The Manufacturing group has access permission for WWW protocol in the Web Proxy service, and access permission for POP3 protocol, in the WinSock Proxy service. The Supervisors group has access permission for WWW and FTP Read protocols in the Web Proxy service, and access permission for the SMTP protocol in the WinSock Proxy service. The Quality Control group has access permission only for WWW protocol in the Web Proxy service. The Interns group has no permissions granted in any of the Proxy Server services. Kate is a member of all four groups. In the Proxy Server services, which protocols does Kate have permission to use?

  • A. WWW only
  • B. FTP Read and SMTP only
  • C. WWW, FTP Read, POP3, and SMTP
  • D. WWW and POP3 only

Answer: C

NEW QUESTION 6

Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

  • A. Trademark laws
  • B. Patent laws
  • C. Copyright laws
  • D. Code Security law

Answer: B

NEW QUESTION 7

Key Distribution Center is used in which authentication method?

  • A. Multi-factor
  • B. Smart cards
  • C. Biometrics
  • D. Security tokens
  • E. Kerberos
  • F. Challenge Handshake Authentication Protocol

Answer: E

NEW QUESTION 8

Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?

  • A. S/MIME
  • B. PGP
  • C. Asymmetric encryption
  • D. Symmetric encryption

Answer: D

NEW QUESTION 9

Which of the following combines the characteristics of a bridge and a router?

  • A. Firewall
  • B. Brouter
  • C. Switch
  • D. Hub
  • E. Repeater

Answer: B

NEW QUESTION 10

The workstations on your network utilize Windows XP (service pack 2 or later). Many users
take their laptops on the road. You are very concerned about the security and want to have a robust firewall solution for mobile users. You have decided that all your firewalls to use the Stateful Packet Inspection (SPI) method. What must you do to provide SPI to your mobile users?

  • A. You must purchase a third party firewall solution for your mobile users.
  • B. Do nothin
  • C. Windows XP service pack 2 has a firewall turned on by default.
  • D. Download the SPI template from Microsoft.
  • E. Configure the Windows XP firewall to use SPI.

Answer: A

NEW QUESTION 11

Kelly is the project manager of the NNQ Project for her company. This project will last for one year and has a budget of $350,000. Kelly is working with her project team and subject matter experts to begin the risk response planning process. When the project manager begins the plan risk response process, what two inputs will she need?

  • A. Risk register and the results of risk analysis
  • B. Risk register and the risk response plan
  • C. Risk register and the risk management plan
  • D. Risk register and power to assign risk responses

Answer: C

NEW QUESTION 12

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

  • A. IPChains
  • B. OpenSSH
  • C. Stunnel
  • D. IPTables

Answer: D

NEW QUESTION 13

Which of the following tools are used to determine the hop counts of an IP packet? Each correct answer represents a complete solution. Choose two.

  • A. Netstat
  • B. Ping
  • C. TRACERT
  • D. IPCONFIG

Answer: BC

NEW QUESTION 14

Which of the following is not needed for effective procurement planning?

  • A. Activity resource management
  • B. Project schedule
  • C. Cost baseline
  • D. Quality risk analysis

Answer: D

NEW QUESTION 15

You work as a Software Developer for uCertify Inc. You have developed a Data Access Logic (DAL) component that will be part of a distributed application. You are conducting integration testing with other components of the distributed application. Which of the following types of testing methods will you need to perform to identify potential security- related issues? Each correct answer represents a part of the solution. Choose two.

  • A. Unit testing
  • B. Stress testing
  • C. Load testing
  • D. Black box testing
  • E. White box testing

Answer: DE

NEW QUESTION 16

You work as a Network Administrator for Tech World Inc. The company has a TCP/IP- based router. You have configured a router on your network. You want to accomplish the following goals:
l Configure the router to require a password to move from user EXEC mode to privileged EXEC mode.
l The password must be listed as a hidden entry in the configuration file. You run the following command: enable password <password>
Which of the goals will this action accomplish?

  • A. The password will be listed as a hidden entry in the configuration file
  • B. The action will accomplish neither of the goals
  • C. The action will accomplish both the goals
  • D. The router will require a password to move from user EXEC mode to privileged EXEC mode

Answer: D

NEW QUESTION 17

Which of the following types of virus is capable of changing its signature to avoid detection?

  • A. Stealth virus
  • B. Boot sector virus
  • C. Macro virus
  • D. Polymorphic virus

Answer: D

NEW QUESTION 18
......

100% Valid and Newest Version GISF Questions & Answers shared by DumpSolutions.com, Get Full Dumps HERE: https://www.dumpsolutions.com/GISF-dumps/ (New 333 Q&As)