aiotestking uk

GISF Exam Questions - Online Test


GISF Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Your success in GIAC GISF is our sole target and we develop all our GISF braindumps in a way that facilitates the attainment of this target. Not only is our GISF study material the best you can find, it is also the most detailed and the most updated. GISF Practice Exams for GIAC GISF are written to the highest standards of technical accuracy.

GIAC GISF Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1

Which of the following algorithms produce 160-bit hash values? Each correct answer represents a complete solution. Choose two.

  • A. MD2
  • B. MD5
  • C. SHA-1
  • D. SHA-0

Answer: CD

NEW QUESTION 2

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

  • A. Denial-of-Service
  • B. Eavesdropping
  • C. Spoofing
  • D. Packet manipulation

Answer: A

NEW QUESTION 3

Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

  • A. Teardrop attack
  • B. SYN flood attack
  • C. Ping of Death attack
  • D. DDoS attack

Answer: D

NEW QUESTION 4

Which of the following terms is used for a router that filters traffic before it is passed to the firewall?

  • A. Screened host
  • B. Demilitarized zone (DMZ)
  • C. Honey pot
  • D. Bastion host

Answer: A

NEW QUESTION 5

You work as an Application Developer for uCertify Inc. The company uses Visual Studio
.NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?

  • A. Kerberos
  • B. HTTPS
  • C. RSA
  • D. IPSEC

Answer: B

NEW QUESTION 6

John works as an Exchange Administrator for Apple Inc. The company has a Windows 2003 Active Directory domain-based network. The network contains several Windows Server 2003 servers. Three of them have been configured as domain controllers. John complains to the Network Administrator that he is unable to manage group memberships. Which of the following operations master roles is responsible for managing group memberships?

  • A. PDC emulator
  • B. Infrastructure master
  • C. Schema master
  • D. RID master

Answer: B

NEW QUESTION 7

Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers? Each correct answer represents a complete solution. Choose all that apply.

  • A. KFSensor
  • B. Sheep dip
  • C. Enum
  • D. SocketShield

Answer: BD

NEW QUESTION 8

John works as a Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. The company is aware of various types of security attacks and wants to impede them. Hence, management has assigned John a project to port scan the company's Web Server. For this, he uses the nmap port scanner and issues the following command to perform idle port scanning:
nmap -PN -p- -sI IP_Address_of_Company_Server
He analyzes that the server's TCP ports 21, 25, 80, and 111 are open.
Which of the following security policies is the company using during this entire process to mitigate the risk of hacking attacks?

  • A. Audit policy
  • B. Antivirus policy
  • C. Non-disclosure agreement
  • D. Acceptable use policy

Answer: A

NEW QUESTION 9

John works as a Network Administrator for Bordeaux Inc. He is planning to design a strategy, so that the employees can connect to a scheduling application. Which of the following strategies is best suited for the company?
(Click the Exhibit button on the toolbar to see the case study.)

  • A. Deploy a VPN server on the VLAN network, and an IIS server on the corporate LAN at the headquarters.
  • B. Deploy a VPN server on the VLAN network, and an IIS server on DMZ.
  • C. Deploy a VPN server on the corporate LAN at the headquarters, and an IIS server on DMZ.
  • D. Deploy a VPN server on DMZ, and an IIS server on the corporate LAN at the headquarters.

Answer: D

NEW QUESTION 10

Which of the following U.S.C. laws is governs the fraudulent activities associated with computers?

  • A. 18 U.S.
  • B. 2251
  • C. 18 U.S.
  • D. 3771
  • E. 18 U.S.
  • F. 2257
  • G. 18 U.S.
  • H. 1030

Answer: D

NEW QUESTION 11

John works as a security manager in Mariotx.Inc. He has been tasked to resolve a network attack issue. To solve the problem, he first examines the critical information about the attacker's interaction to the network environment. He prepares a past record and behavioral document of the attack to find a direction of the solution. Then he decides to perform an action based on the previous hypothesis and takes the appropriate action against the attack. Which of the following strategies has John followed?

  • A. Maneuver warfare
  • B. Control theory
  • C. SWOT Analysis
  • D. OODA loop

Answer: D

NEW QUESTION 12

Which of the following statements are true about Dsniff?
Each correct answer represents a complete solution. Choose two.

  • A. It is a virus.
  • B. It contains Trojans.
  • C. It is antivirus.
  • D. It is a collection of various hacking tools.

Answer: BD

NEW QUESTION 13

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

  • A. Risk acceptance
  • B. Risk transfer
  • C. Risk avoidance
  • D. Risk mitigation

Answer: B

NEW QUESTION 14

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e- mails.
Which of the following will you use to accomplish this?

  • A. NTFS
  • B. PPTP
  • C. PGP
  • D. IPSec

Answer: C

NEW QUESTION 15

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

  • A. The application layer port numbers and the transport layer headers
  • B. The presentation layer headers and the session layer port numbers
  • C. The network layer headers and the session layer port numbers
  • D. The transport layer port numbers and the application layer headers

Answer: D

NEW QUESTION 16

You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?

  • A. Use Incident handling
  • B. Use OODA loop
  • C. Use Information assurance
  • D. Use SMART model.

Answer: D

NEW QUESTION 17

Which of the following books is used to examine integrity and availability?

  • A. Brown Book
  • B. Red Book
  • C. Purple Book
  • D. Orange Book

Answer: B

NEW QUESTION 18
......

Recommend!! Get the Full GISF dumps in VCE and PDF From Surepassexam, Welcome to Download: https://www.surepassexam.com/GISF-exam-dumps.html (New 333 Q&As Version)