Examcollection offers free demo for GISF exam. "GIAC Information Security Fundamentals", also known as GISF exam, is a GIAC Certification. This set of posts, Passing the GIAC GISF exam, will help you answer those questions. The GISF Questions & Answers covers all the knowledge points of the real exam. 100% real GIAC GISF exams and revised by experts!
Free demo questions for GIAC GISF Exam Dumps Below:
NEW QUESTION 1
Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers? Each correct answer represents a complete solution. Choose all that apply.
Answer: BD
NEW QUESTION 2
John works as a professional Ethical Hacker. He has been assigned a project to test the
security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?
Answer: B
NEW QUESTION 3
You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. The messaging organization contains one Hub Transport server, one Client Access server, and two Mailbox servers.
You are planning to deploy an Edge Transport server in your messaging organization to minimize the attack surface. At which of the following locations will you deploy the Edge Transport server?
Answer: D
NEW QUESTION 4
You work as a Security manager for Orangesect Inc. The enterprise is using the OODA loop strategy to counter the security issues in the enterprise. Some of the IP addresses of the enterprise have been hacked. You match up the present hacking issue and condition with the past hacking experiences to find a solution. Which of the following phases of the OODA loop involves the procedure followed by you?
Answer: B
NEW QUESTION 5
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus.
Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?
Answer: D
NEW QUESTION 6
Which of the following are the types of Intrusion detection system?
Answer: CD
NEW QUESTION 7
Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?
Answer: B
NEW QUESTION 8
Which of the following is an organization that defines standards for anti-virus software?
Answer: A
NEW QUESTION 9
Which of the following types of firewalls forms a session flow table?
Answer: D
NEW QUESTION 10
Which of the following methods of encryption uses a single key to encrypt and decrypt data?
Answer: D
NEW QUESTION 11
You and your project team want to perform some qualitative analysis on the risks you have identified and documented in Project Web Access for your project. You would like to create a table that captures the likelihood and affect of the risk on the project. What type of a chart or table would you like to create for the project risks?
Answer: B
NEW QUESTION 12
Which of the following protocols implements VPN using IPSec?
Answer: D
NEW QUESTION 13
Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?
Answer: C
NEW QUESTION 14
What is a variant with regard to Configuration Management?
Answer: B
NEW QUESTION 15
Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?
Each correct answer represents a complete solution. Choose all that apply.
Answer: AC
NEW QUESTION 16
Hardening a system is one of the practical methods of securing a computer system. Which of the following techniques is used for hardening a computer system?
Answer: D
NEW QUESTION 17
Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?
Answer: C
NEW QUESTION 18
......
Recommend!! Get the Full GISF dumps in VCE and PDF From Dumps-hub.com, Welcome to Download: https://www.dumps-hub.com/GISF-dumps.html (New 333 Q&As Version)