Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

GISF GIAC Information Security Fundamentals Questions and Answers

Questions 4

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

Options:

A.

Quantitative analysis

B.

Qualitative analysis

C.

Estimate activity duration

D.

Risk identification

Buy Now
Questions 5

You switch on your mobile Bluetooth device to transfer data to another Bluetooth device. Which of the following Information assurance pillars ensures that the data transfer is being performed with the targeted authorized Bluetooth device and not with any other or unauthorized device?

Options:

A.

Data integrity

B.

Confidentiality

C.

Authentication

D.

Non-repudiation

Buy Now
Questions 6

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

Options:

A.

Public key

B.

Digital certificates

C.

Twofish

D.

RSA

Buy Now
Questions 7

You work in an enterprise as a Network Engineer. Your enterprise has a secure internal network.

You want to apply an additional network packet filtering device that is intermediate to your enterprise's internal network and the outer network (internet). Which of the following network zones will you create to accomplish this task?

Options:

A.

Autonomous system area (AS)

B.

Demilitarized zone (DMZ)

C.

Border network area

D.

Site network area

Buy Now
Questions 8

Which of the following protocols can help you get notified in case a router on a network fails?

Options:

A.

SMTP

B.

SNMP

C.

TCP

D.

ARP

Buy Now
Questions 9

Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Address Resolution Protocol (ARP)

B.

Network Link Protocol (NWLink)

C.

User Datagram Protocol (UDP)

D.

Internet Control Message Protocol (ICMP)

Buy Now
Questions 10

Hardening a system is one of the practical methods of securing a computer system. Which of the following techniques is used for hardening a computer system?

Options:

A.

Disabling all user accounts

B.

Applying egress filtering

C.

Applying Access Control List (ACL)

D.

Applying a patch to the OS kernel

Buy Now
Questions 11

The new security policy requires you to encrypt all data transmitted from the laptop computers of sales personnel to the distribution centers. How will you implement the security requirements?

(Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Use 40-bit encryption for Routing and Remote Access Service(RRAS) Server. Use PPTP without packet filtering for VPN.

B.

Use 128-bit encryption for Routing and Remote Access Service(RRAS) Server. Use PPTP without packet filtering for VPN.

C.

Use 128-bit encryption for Routing and Remote Access Service(RRAS) Server. Use PPTP with packet filtering for VPN.

D.

Use 40-bit encryption for the Routing and Remote Access Service(RRAS) Server. Use PPTP with packet filtering for VPN.

Buy Now
Questions 12

Which of the following statements about asymmetric encryption are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Asymmetric encryption is faster as compared to symmetric encryption.

B.

Asymmetric encryption uses a public key and a private key pair for data encryption.

C.

In asymmetric encryption, only one key is needed to encrypt and decrypt data.

D.

In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.

Buy Now
Questions 13

Which of the following objects in an Active Directory serve as security principles?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

User accounts

B.

Organizational units (OUs)

C.

Computer accounts

D.

Groups

Buy Now
Questions 14

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk identification

B.

Project schedule

C.

Team members list

D.

Risk analysis

Buy Now
Questions 15

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions, which is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Attacker can exploit any protocol used to go into the internal network or intranet of the com pany.

B.

Attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different.

C.

Attacker can gain access to the Web server in a DMZ and exploit the database.

D.

Attacker can perform Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network.

Buy Now
Questions 16

You have successfully installed an IRM server into your environment. This IRM server will be utilized to protect the company's videos, which are available to all employees but contain sensitive data. You log on to the WSS 3.0 server with administrator permissions and navigate to the Operations section. What option should you now choose so that you can input the RMS server name for the WSS 3.0 server to use?

Options:

A.

Self-service site management

B.

Content databases

C.

Information Rights Management

D.

Define managed paths

Buy Now
Questions 17

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Boot sector

B.

Multipartite

C.

File

D.

Stealth

Buy Now
Questions 18

You are the project manager of a new project to install new hardware for your organization's computer network. You have never worked with networking software or hardware before so you enroll in a class to learn more about the technology you'll be managing in your project. This is an example of which one of the following?

Options:

A.

Cost of nonconformance to quality

B.

Enhancing your personal professional competence

C.

Team development

D.

A waste for the project as the project manager does not need to know much about the project's application

Buy Now
Questions 19

You want to install a server that can be accessed by external users. You also want to ensure that these users cannot access the rest of the network. Where will you place the server?

Options:

A.

Intranet

B.

Local Area Network

C.

Internet

D.

Demilitarized Zone

E.

Extranet

F.

Wide Area Network

Buy Now
Questions 20

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Packet filtering firewall

B.

Application-level firewall

C.

Stateful inspection firewall

D.

Circuit-level firewall

Buy Now
Questions 21

Which of the following roles is used to ensure that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

Options:

A.

The Service Level Manager

B.

The Configuration Manager

C.

The IT Security Manager

D.

The Change Manager

Buy Now
Questions 22

Which of the following statements are true about routers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Routers do not limit physical broadcast traffic.

B.

Routers act as protocol translators and bind dissimilar networks.

C.

Routers organize addresses into classes, which are used to determine how to move packets from one network to another.

D.

Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.

Buy Now
Questions 23

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cookies folder

B.

Temporary Internet Folder

C.

Download folder

D.

History folder

Buy Now
Questions 24

Jane works as a Consumer Support Technician for McRoberts Inc. The company provides troubleshooting support to users. A user named Peter installs Windows Vista on his computer. He connects his computer on the network. He wants to protect his computer from malicious software and prevent hackers from gaining access to his computer through the network. Which of the following actions will Jane assist Peter to perform to accomplish the task?

Options:

A.

Don't stay logged on as an administrator.

B.

Use a firewall.

C.

Keep the computer up-to-date.

D.

Run antivirus software on the computer.

Buy Now
Questions 25

Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?

Options:

A.

Eavesdropping

B.

Intrusion

C.

Dialler attack

D.

Denial of service

Buy Now
Questions 26

Which of the following statements are true about classless routing protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

They extend the IP addressing scheme.

B.

The same subnet mask is used everywhere on the network.

C.

They support VLSM and discontiguous networks.

D.

IGRP is a classless routing protocol.

Buy Now
Questions 27

Your computer continues to operate even if its disk drive has failed. This ability is known as _____.

Options:

A.

Recovery

B.

Fault Tolerance

C.

Backups

D.

Disaster Recovery

E.

Hashing

F.

Independent Disks

Buy Now
Questions 28

You send and receive messages on Internet. A man-in-the-middle attack can be performed to capture and read your message. Which of the following Information assurance pillars ensures the security of your message or data against this type of attack?

Options:

A.

Authentication

B.

Non-repudiation

C.

Data availability

D.

Confidentiality

Buy Now
Questions 29

You have created a Web site, which will be used for e-commerce. You want to ensure that the transactions are highly secured. For this purpose, you have to create a system to verify the identity of a potential customer. Which of the following security techniques will you use?

Options:

A.

Asymmetric encryption

B.

Symmetric encryption

C.

Spoofing

D.

Digital certificate

Buy Now
Questions 30

Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?

Options:

A.

ESP

B.

IKE

C.

ISAKMP

D.

AH

Buy Now
Questions 31

Which of the following refers to the emulation of the identity of a network computer by an attacking computer?

Options:

A.

Spoofing

B.

PING attack

C.

Hacking

D.

SYN attack

Buy Now
Questions 32

Rick is the project manager of a construction project. He is in a process to procure some construction equipments. There are four vendors available for supplying the equipments. Rick does not want one of them to participate in the bidding as he has some personal grudges against the owner of the vendor. This is the violation of which of the following categories of the Project Management Institute Code of Ethics and Professional Conduct?

Options:

A.

Respect

B.

Honesty

C.

Responsibility

D.

Fairness

Buy Now
Questions 33

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

Options:

A.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

B.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

C.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer

D.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

Buy Now
Questions 34

Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

KFSensor

B.

Sheep dip

C.

Enum

D.

SocketShield

Buy Now
Questions 35

You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

Options:

A.

Vertical Privilege Escalation

B.

Session Hijacking

C.

Account hijacking

D.

Horizontal Privilege Escalation

Buy Now
Questions 36

What is VeriSign?

Options:

A.

It is a data warehouse.

B.

It is an e-commerce portal.

C.

It is a search engine.

D.

It is a payment gateway.

Buy Now
Questions 37

Which of the following logs contains events pertaining to security as defined in the Audit policy?

Options:

A.

DNS server log

B.

Application log

C.

System log

D.

Directory Service log

E.

Security log

F.

File Replication Service log

Buy Now
Questions 38

Fred is the project manager for the TCC Company. His company has an internal policy that states each year they will provide free services to a nonprofit organization. Therefore, the company and its employees are not allowed to charge or receive money or gifts from the nonprofit organization they choose to provide free services. This year, the TCC Company offers to provide project management services to the children's hospital for a marketing campaign to raise money. Due to the TCC Company's project management services, the nonprofit agency exceeded previous years fund raising efforts. To show appreciation the nonprofit organization offered to reimburse the project manager for his travel expenses. Which of the following best describes how the project manager should handle the situation?

Options:

A.

Say thank you and let them pay for the travel, it is the least they can do.

B.

Tell the hospital no thank you and explain it is against company policy to accept payment for services provided to their pro bono customers.

C.

Say nothing as to not hurt the feelings of the children's hospital.

D.

Ask if the hospital could pay for some of the supplies too.

Buy Now
Questions 39

You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?

Options:

A.

Network Based

B.

Dictionary

C.

Heuristic

D.

Host based

Buy Now
Questions 40

Which of the following are the types of Intrusion detection system?

Options:

A.

Server-based intrusion detection system (SIDS)

B.

Client based intrusion detection system (CIDS)

C.

Host-based intrusion detection system (HIDS)

D.

Network intrusion detection system (NIDS)

Buy Now
Questions 41

You are the project manager for a software technology company. You and the project team have identified that the executive staff is not fully committed to the project. Which of the following best describes the risk?

Options:

A.

Residual risks

B.

Trend analysis

C.

Schedule control

D.

Organizational risks

Buy Now
Questions 42

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

Options:

A.

Antivirus

B.

Backup

C.

Symmetric encryption

D.

Firewall

Buy Now
Questions 43

You have purchased a wireless router for your home network. What will you do first to enhance the security?

Options:

A.

Change the default password and administrator's username on the router

B.

Disable the network interface card on the computer

C.

Configure DMZ on the router

D.

Assign a static IP address to the computers

Buy Now
Questions 44

Which of the following is used in asymmetric encryption?

Options:

A.

Public key and user key

B.

Public key and private key

C.

SSL

D.

NTFS

Buy Now
Questions 45

You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?

Options:

A.

Risk Management Plan

B.

Communications Management Plan

C.

Stakeholder management strategy

D.

Resource Management Plan

Buy Now
Questions 46

You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?

Options:

A.

Kerberos

B.

HTTPS

C.

RSA

D.

IPSEC

Buy Now
Questions 47

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

Options:

A.

Technical representative

B.

Legal representative

C.

Lead investigator

D.

Information security representative

Buy Now
Questions 48

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Recovery

B.

Contamination

C.

Identification

D.

Eradication

E.

Preparation

Buy Now
Questions 49

Which of the following devices or hardware parts employs SMART model system as a monitoring system?

Options:

A.

Modem

B.

RAM

C.

Hard disk

D.

IDS

Buy Now
Exam Code: GISF
Exam Name: GIAC Information Security Fundamentals
Last Update: Nov 21, 2024
Questions: 333
GISF pdf

GISF PDF

$28  $80
GISF Engine

GISF Testing Engine

$33.25  $95
GISF PDF + Engine

GISF PDF + Testing Engine

$45.5  $130