Your success in GIAC GISF is our sole target and we develop all our GISF braindumps in a way that facilitates the attainment of this target. Not only is our GISF study material the best you can find, it is also the most detailed and the most updated. GISF Practice Exams for GIAC GISF are written to the highest standards of technical accuracy.
GIAC GISF Free Dumps Questions Online, Read and Test Now.
NEW QUESTION 1
Which of the following algorithms produce 160-bit hash values? Each correct answer represents a complete solution. Choose two.
Answer: CD
NEW QUESTION 2
You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?
Answer: A
NEW QUESTION 3
Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?
Answer: D
NEW QUESTION 4
Which of the following terms is used for a router that filters traffic before it is passed to the firewall?
Answer: A
NEW QUESTION 5
You work as an Application Developer for uCertify Inc. The company uses Visual Studio
.NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?
Answer: B
NEW QUESTION 6
John works as an Exchange Administrator for Apple Inc. The company has a Windows 2003 Active Directory domain-based network. The network contains several Windows Server 2003 servers. Three of them have been configured as domain controllers. John complains to the Network Administrator that he is unable to manage group memberships. Which of the following operations master roles is responsible for managing group memberships?
Answer: B
NEW QUESTION 7
Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers? Each correct answer represents a complete solution. Choose all that apply.
Answer: BD
NEW QUESTION 8
John works as a Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. The company is aware of various types of security attacks and wants to impede them. Hence, management has assigned John a project to port scan the company's Web Server. For this, he uses the nmap port scanner and issues the following command to perform idle port scanning:
nmap -PN -p- -sI IP_Address_of_Company_Server
He analyzes that the server's TCP ports 21, 25, 80, and 111 are open.
Which of the following security policies is the company using during this entire process to mitigate the risk of hacking attacks?
Answer: A
NEW QUESTION 9
John works as a Network Administrator for Bordeaux Inc. He is planning to design a strategy, so that the employees can connect to a scheduling application. Which of the following strategies is best suited for the company?
(Click the Exhibit button on the toolbar to see the case study.)
Answer: D
NEW QUESTION 10
Which of the following U.S.C. laws is governs the fraudulent activities associated with computers?
Answer: D
NEW QUESTION 11
John works as a security manager in Mariotx.Inc. He has been tasked to resolve a network attack issue. To solve the problem, he first examines the critical information about the attacker's interaction to the network environment. He prepares a past record and behavioral document of the attack to find a direction of the solution. Then he decides to perform an action based on the previous hypothesis and takes the appropriate action against the attack. Which of the following strategies has John followed?
Answer: D
NEW QUESTION 12
Which of the following statements are true about Dsniff?
Each correct answer represents a complete solution. Choose two.
Answer: BD
NEW QUESTION 13
Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?
Answer: B
NEW QUESTION 14
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e- mails.
Which of the following will you use to accomplish this?
Answer: C
NEW QUESTION 15
What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?
Answer: D
NEW QUESTION 16
You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?
Answer: D
NEW QUESTION 17
Which of the following books is used to examine integrity and availability?
Answer: B
NEW QUESTION 18
......
Recommend!! Get the Full GISF dumps in VCE and PDF From Surepassexam, Welcome to Download: https://www.surepassexam.com/GISF-exam-dumps.html (New 333 Q&As Version)