GISF | Most Recent GISF Exams For GIAC Information Security Fundamentals Certification

It is impossible to pass GIAC GISF exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed GIAC GISF practice questions. You will get a surprising result by our Up to the minute GIAC Information Security Fundamentals practice guides.

Free demo questions for GIAC GISF Exam Dumps Below:

NEW QUESTION 1

Which of the following federal laws are related to hacking activities? Each correct answer represents a complete solution. Choose three.

  • A. 18 U.S.
  • B. 1029
  • C. 18 U.S.
  • D. 1028
  • E. 18 U.S.
  • F. 1030
  • G. 18 U.S.
  • H. 2510

Answer: ACD

NEW QUESTION 2

Which of the following refers to encrypted text?

  • A. Plaintext
  • B. Cookies
  • C. Ciphertext
  • D. Hypertext

Answer: C

NEW QUESTION 3

You work as a security manager for Qualxiss Inc. Your Company involves OODA loop for resolving and deciding over company issues. You have detected a security breach issue in your company.
Which of the following procedures regarding the breach is involved in the observe phase of the OODA loop?

  • A. Follow the company security guidelines.
  • B. Decide an activity based on a hypothesis.
  • C. Implement an action practically as policies.
  • D. Consider previous experiences of security breaches.

Answer: A

NEW QUESTION 4

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

  • A. Organizing a solution to remove an incident
  • B. Building up an incident response kit
  • C. Working with QA to validate security of the enterprise
  • D. Setting up the initial position after an incident

Answer: B

NEW QUESTION 5

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions, which is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Attacker can exploit any protocol used to go into the internal network or intranet of the com pany.
  • B. Attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different.
  • C. Attacker can gain access to the Web server in a DMZ and exploit the database.
  • D. Attacker can perform Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network.

Answer: ACD

NEW QUESTION 6

Which of the following policies define how Identification and Authorization occur and determine access control, audits, and network connectivity?

  • A. Information policies
  • B. Usage policies
  • C. Security policies
  • D. Administrative policies
  • E. Disaster Recovery Plans
  • F. Design Requirements

Answer: C

NEW QUESTION 7

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

  • A. Sending deceptive e-mails
  • B. Sending notifications
  • C. Shunning
  • D. Logging
  • E. Spoofing
  • F. Network Configuration Changes

Answer: F

NEW QUESTION 8

Tom works as the project manager for BlueWell Inc. He is working with his project to ensure timely and appropriate generation, retrieval, distribution, collection, storage, and ultimate disposition of project information. What is the process in which Tom is working?

  • A. Stakeholder expectation management
  • B. Stakeholder analysis
  • C. Work performance measurement
  • D. Project communication management

Answer: D

NEW QUESTION 9

Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?

  • A. Asymmetric
  • B. Symmetric
  • C. Numeric
  • D. Hashing

Answer: B

NEW QUESTION 10

Which of the following is the purpose of employing DMZ (Demilitarized zone) in a network?

  • A. It adds an additional layer of security to a Local Area Network (LAN).
  • B. It creates a check-point to a Local Area Network (LAN).
  • C. It adds an extra node to the Local Area Network (LAN).
  • D. It works along with the firewall to filter unwanted data packets.

Answer: A

NEW QUESTION 11

In which of the following access control models can a user not grant permissions to other
users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

  • A. Discretionary Access Control (DAC)
  • B. Role Based Access Control (RBAC)
  • C. Access Control List (ACL)
  • D. Mandatory Access Control (MAC)

Answer: D

NEW QUESTION 12

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

  • A. Availability
  • B. Integrity
  • C. Confidentiality
  • D. Non-repudiation

Answer: B

NEW QUESTION 13

You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

  • A. FTP
  • B. Gopher
  • C. Firewall
  • D. HTTP

Answer: C

NEW QUESTION 14

You are the Administrator for a corporate network. You are concerned about denial of service attacks. Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

  • A. Shorten the timeout for connection attempts.
  • B. Place a honey pot in the DMZ.
  • C. Implement a strong password policy.
  • D. Implement network based antivirus.

Answer: A

NEW QUESTION 15

You and your project team want to perform some qualitative analysis on the risks you have identified and documented in Project Web Access for your project. You would like to create a table that captures the likelihood and affect of the risk on the project. What type of a chart or table would you like to create for the project risks?

  • A. Risk Breakdown Structure
  • B. Risk Probability and Impact Matrix
  • C. Risk Review Table
  • D. Risk Impact and Affect Matrix

Answer: B

NEW QUESTION 16

You are a Product manager of Marioxiss Inc. Your company management is having a conflict with another company Texasoftg Inc. over an issue of security policies. Your legal advisor has prepared a document that includes the negotiation of views for both the companies. This solution is supposed to be the key for conflict resolution. Which of the following are the forms of conflict resolution that have been employed by the legal advisor?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Orientation
  • B. Mediation
  • C. Negotiation
  • D. Arbitration

Answer: BCD

NEW QUESTION 17

Which of the following statements about Secure Shell (SSH) are true? Each correct answer represents a complete solution. Choose three.

  • A. It was designed as a replacement for TELNET and other insecure shells.
  • B. It is a network protocol used primarily on Linux and Unix based systems.
  • C. It allows data to be exchanged using a secure channel between two networked devices.
  • D. It is the core routing protocol of the Internet.

Answer: ABC

NEW QUESTION 18
......

P.S. Easily pass GISF Exam with 333 Q&As Dumpscollection.com Dumps & pdf Version, Welcome to Download the Newest Dumpscollection.com GISF Dumps: https://www.dumpscollection.net/dumps/GISF/ (333 New Questions)