GISF | How Many Questions Of GISF Exam Prep

Our pass rate is high to 98.9% and the similarity percentage between our GISF study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the GIAC GISF exam in just one try? I am currently studying for the GIAC GISF exam. Latest GIAC GISF Test exam practice questions and answers, Try GIAC GISF Brain Dumps First.

Online GIAC GISF free dumps demo Below:

NEW QUESTION 1

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

  • A. F936.28A1.5BCD.DEFA
  • B. A3-07-B9-E3-BC-F9
  • C. 1011-0011-1010-1110-1100-0001
  • D. 132.298.1.23

Answer: B

NEW QUESTION 2

You are developing an online business solution for National Institute of Meteorological and Oceanographic Research (NIMOR). A case study for the organization is given in the exhibit. Based on the case study, you need to implement Internet security so that no user can hack confidential data. According to you, which of the following security options will you use for your solution? Each correct answer represents a complete solution. Choose all that apply. (Click the Exhibit button on the toolbar to see the case study.)

  • A. Antivirus and antispyware software
  • B. Secure Sockets Layer and digital certificates
  • C. Firewall security
  • D. Automatic Updates in Windows XP

Answer: AC

NEW QUESTION 3

John works as a Network Administrator for Bordeaux Inc. He is planning to design a strategy, so that the employees can connect to a scheduling application. Which of the following strategies is best suited for the company?
(Click the Exhibit button on the toolbar to see the case study.)

  • A. Deploy a VPN server on the VLAN network, and an IIS server on the corporate LAN at the headquarters.
  • B. Deploy a VPN server on the VLAN network, and an IIS server on DMZ.
  • C. Deploy a VPN server on the corporate LAN at the headquarters, and an IIS server on DMZ.
  • D. Deploy a VPN server on DMZ, and an IIS server on the corporate LAN at the headquarters.

Answer: D

NEW QUESTION 4

You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

  • A. Vertical Privilege Escalation
  • B. Session Hijacking
  • C. Account hijacking
  • D. Horizontal Privilege Escalation

Answer: D

NEW QUESTION 5

You are the project manager of a new project in your organization. You and the project team have identified the project risks, completed risk analysis, and are planning the most appropriate risk responses. Which of the following tools is most effective to choose the most appropriate risk response?

  • A. Project network diagrams
  • B. Delphi Technique
  • C. Decision tree analysis
  • D. Cause-and-effect diagrams

Answer: C

NEW QUESTION 6

The executive team wants you to track labor costs for your project as well as progress on task completion and the resulting dates. What information must you update for tasks to provide this information?

  • A. Start, Work, and Remaining Work
  • B. Actual Start and Percent Complete
  • C. Actual Start, Actual Work, and Remaining Work
  • D. Actual Start, Percent Complete, and Remaining Duration

Answer: C

NEW QUESTION 7

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.

  • A. Dictionary attack
  • B. Rule based attack
  • C. Brute Force attack
  • D. Hybrid attack

Answer: ACD

NEW QUESTION 8

Web applications play a vital role in deploying different databases with user accessibility on the Internet. Which of the following allows an attacker to get unauthorized access to the database of a Web application by sending (attacking) user-supplied data to an interpreter as part of a command or query?

  • A. Cross Site Scripting
  • B. Injection flaw
  • C. Cross Site Request Forgery (CSRF)
  • D. Malicious File Execution

Answer: B

NEW QUESTION 9

Which of the following monitors program activities and modifies malicious activities on a system?

  • A. Back door
  • B. HIDS
  • C. RADIUS
  • D. NIDS

Answer: B

NEW QUESTION 10

Cryptography is the science of?

  • A. Encrypting and decrypting plain text messages.
  • B. Decrypting encrypted text messages.
  • C. Encrypting plain text messages.
  • D. Hacking secure information.

Answer: A

NEW QUESTION 11

You are the project manager of the HHH Project. The stakeholders for this project are scattered across the world and you need a method to promote interaction. You determine that a Web conferencing software would be the most cost effective solution. The stakeholders can watch a slide show while you walk them through the project details. The stakeholders can hear you, ask questions via a chat software, and post concerns. What is the danger in this presentation?

  • A. 55 percent of all communication is nonverbal and this approach does not provide non- verbal communications.
  • B. The technology is not proven as reliable.
  • C. The stakeholders won't really see you.
  • D. The stakeholders are not required to attend the entire session.

Answer: A

NEW QUESTION 12

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

  • A. Packet filter firewall
  • B. Proxy-based firewall
  • C. Stateful firewall
  • D. Endian firew

Answer: B

NEW QUESTION 13

Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

  • A. Trademark laws
  • B. Patent laws
  • C. Copyright laws
  • D. Code Security law

Answer: B

NEW QUESTION 14

Firekiller 2000 is an example of a _____.

  • A. DoS attack Trojan
  • B. Data sending Trojan
  • C. Remote access Trojan
  • D. Security software disabler Trojan

Answer: D

NEW QUESTION 15

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

  • A. Quantitative analysis
  • B. Qualitative analysis
  • C. Estimate activity duration
  • D. Risk identification

Answer: B

NEW QUESTION 16

Which of the following is a remote access protocol that supports encryption?

  • A. PPP
  • B. SLIP
  • C. UDP
  • D. SNMP

Answer: A

NEW QUESTION 17

What is a variant with regard to Configuration Management?

  • A. A CI that has the same name as another CI but shares no relationship.
  • B. A CI that has the same essential functionality as another CI but a bit different in some small manner.
  • C. A CI that particularly refers to a hardware specification.
  • D. A CI that particularly refers to a software version.

Answer: B

NEW QUESTION 18
......

100% Valid and Newest Version GISF Questions & Answers shared by Downloadfreepdf.net, Get Full Dumps HERE: https://www.downloadfreepdf.net/GISF-pdf-download.html (New 333 Q&As)