GISF | The Secret Of GIAC GISF Vce

Your success in GIAC GISF is our sole target and we develop all our GISF braindumps in a way that facilitates the attainment of this target. Not only is our GISF study material the best you can find, it is also the most detailed and the most updated. GISF Practice Exams for GIAC GISF are written to the highest standards of technical accuracy.

Check GISF free dumps before getting the full version:

NEW QUESTION 1

You work as a Security manager for Qualoxizz Inc. Your company has number of network switches in the site network infrastructure. Which of the following actions will you perform to ensure the security of the switches in your company?

  • A. Set long session timeouts.
  • B. Open up all the unused management ports.
  • C. Set similar passwords for each management port.
  • D. Ignore usage of the default account settings.

Answer: D

NEW QUESTION 2

Availability Management allows organizations to sustain the IT service availability to support the business at a justifiable cost. Which of the following elements of Availability Management is used to perform at an agreed level over a period of time?
Each correct answer represents a part of the solution. Choose all that apply.

  • A. Maintainability
  • B. Resilience
  • C. Error control
  • D. Recoverability
  • E. Reliability
  • F. Security
  • G. Serviceability

Answer: ABDEFG

NEW QUESTION 3

How long are cookies in effect if no expiration date is set?

  • A. Fifteen days
  • B. Until the session ends.
  • C. Forever
  • D. One year

Answer: B

NEW QUESTION 4

Which of the following refers to a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens?

  • A. Man-trap
  • B. Man-in-the-middle
  • C. Demilitarized zone (DMZ)
  • D. Firewall

Answer: A

NEW QUESTION 5

You want to install a server that can be accessed by external users. You also want to ensure that these users cannot access the rest of the network. Where will you place the server?

  • A. Intranet
  • B. Local Area Network
  • C. Internet
  • D. Demilitarized Zone
  • E. Extranet
  • F. Wide Area Network

Answer: D

NEW QUESTION 6

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

  • A. A risk probability-impact matrix
  • B. Quantitative risk analysis
  • C. Qualitative risk analysis
  • D. Seven risk responses

Answer: C

NEW QUESTION 7

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

  • A. Authentication
  • B. Confidentiality
  • C. Integrity
  • D. Non-repudiation

Answer: B

NEW QUESTION 8

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?
Each correct answer represents a complete solution. Choose two.

  • A. Attacker can use the Ping Flood DoS attack if WZC is used.
  • B. Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.
  • C. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.
  • D. It will not allow the configuration of encryption and MAC filterin
  • E. Sending information is not secure on wireless network.

Answer: BC

NEW QUESTION 9

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host?

  • A. Blackbox testing
  • B. Firewalking
  • C. Brainstorming
  • D. Port redirection

Answer: D

NEW QUESTION 10

Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

  • A. Snort
  • B. Wireshark
  • C. NetWitness
  • D. Netresident

Answer: B

NEW QUESTION 11

You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company's network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?

  • A. Teardrop attack
  • B. Replay attack
  • C. Denial-of-Service (DoS) attack
  • D. Polymorphic shell code attack

Answer: C

NEW QUESTION 12

Your network utilizes a coax cable for connections between various network segments. Your predecessor made sure none of the coax cables were in an exposed area that could easily be accessed. This caused the use of significant extra cabling. Why do you think this was done?

  • A. This was an error you should correc
  • B. It wastes the cable and may make maintenance more difficult.
  • C. He was concerned about wireless interception of data.
  • D. He was concerned about electromagnetic emanation being used to gather data.
  • E. He was concerned about vampire taps.

Answer: D

NEW QUESTION 13

Under the SMART scheme, the Predictive Failure Analysis Technology is used to determine the failure or crash for which of the following parts of a computer system?

  • A. Operating System
  • B. Hard Disc drive
  • C. Software
  • D. Internet Browser

Answer: B

NEW QUESTION 14

Which of the following statements about testing are true?
Each correct answer represents a complete solution. Choose all that apply.

  • A. A stub is a program that simulates a calling unit, and a driver is a program that simulates a called unit.
  • B. In unit testing, each independent unit of an application is tested separately.
  • C. In integration testing, a developer combines two units that have already been tested into a component.
  • D. The bottom-up approach to integration testing helps minimize the need for stubs.

Answer: BCD

NEW QUESTION 15

Which of the following tools can be used to perform tasks such as Windows password cracking Windows enumeration, and VoIP session sniffing?

  • A. John the Ripper
  • B. Obiwan
  • C. Cain
  • D. L0phtcrack

Answer: C

NEW QUESTION 16

How should you configure USSOWA1 and USSTIME1 to allow secure access for remote employees?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose three.

  • A. Place USSTIME1 on the internal network
  • B. Place USSOWA1 on the internal network
  • C. Enable all connections from external network
  • D. Place USSTIME1 in a DMZ
  • E. Place USSOWA1 in a DMZ
  • F. Allow only TCP port 443 connections from the external network
  • G. Allow only TCP port 80 connections from the external network

Answer: DEF

NEW QUESTION 17

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

  • A. Sensitive
  • B. Unclassified
  • C. Confidential
  • D. Public
  • E. Secret
  • F. Private

Answer: ACDF

NEW QUESTION 18
......

P.S. Easily pass GISF Exam with 333 Q&As DumpSolutions.com Dumps & pdf Version, Welcome to Download the Newest DumpSolutions.com GISF Dumps: https://www.dumpsolutions.com/GISF-dumps/ (333 New Questions)