GISF Premium Bundle

GISF Premium Bundle

GIAC Information Security Fundamentals Certification Exam

4.5 
(55050 ratings)
333 QuestionsPractice Tests
333 PDFPrint version
November 21, 2024Last update

GIAC GISF Free Practice Questions

Act now and download your GIAC GISF test today! Do not waste time for the worthless GIAC GISF tutorials. Download Up to date GIAC GIAC Information Security Fundamentals exam with real questions and answers and begin to learn GIAC GISF with a classic professional.

Online GIAC GISF free dumps demo Below:

NEW QUESTION 1

The security of a computer against the unauthorized usage largely depends upon the efficiency of the applied access control method. Which of the following statements are true about a computer access control method?
Each correct answer represents a complete solution. Choose all that apply.

  • A. It can be based upon fingerprint or eye recognition.
  • B. It can be time-synchronous.
  • C. It provides security against the virus attacks.
  • D. It provides security against Eavesdropping.
  • E. It checks the authenticity of a person.
  • F. It is used to encrypt a message before transmitting it on a network.

Answer: ABE

NEW QUESTION 2

Which of the following can be used to prevent routing loops in distance vector routing protocols?
Each correct answer represents a complete solution. Choose two.

  • A. Split horizon
  • B. Link-state advertisement
  • C. Spanning Tree Protocol
  • D. Hold-down timers

Answer: AD

NEW QUESTION 3

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

  • A. Packet filter firewall
  • B. Proxy-based firewall
  • C. Stateful firewall
  • D. Endian firew

Answer: B

NEW QUESTION 4

The TCP/IP protocol suite uses _____ to identify which service a certain packet is destined for.

  • A. Subnet masks
  • B. IP addresses
  • C. MAC addresses
  • D. Port numbers

Answer: D

NEW QUESTION 5

Which of the following types of virus is capable of changing its signature to avoid detection?

  • A. Stealth virus
  • B. Boot sector virus
  • C. Macro virus
  • D. Polymorphic virus

Answer: D

NEW QUESTION 6

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

  • A. Cyber squatting
  • B. Cyber Stalking
  • C. Man-in-the-middle attack
  • D. Spoofing

Answer: D

NEW QUESTION 7
CORRECT TEXT
Fill in the blank with the appropriate layer name.
The Network layer of the OSI model corresponds to the ______ layer of the TCP/IP model.


Solution:
Internet

Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 8

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

  • A. Web ripping
  • B. Email spoofing
  • C. Steganography
  • D. Social engineering

Answer: C

NEW QUESTION 9

Key Distribution Center is used in which authentication method?

  • A. Multi-factor
  • B. Smart cards
  • C. Biometrics
  • D. Security tokens
  • E. Kerberos
  • F. Challenge Handshake Authentication Protocol

Answer: E

NEW QUESTION 10

You are the project manager of a new project in your organization. You and the project team have identified the project risks, completed risk analysis, and are planning the most appropriate risk responses. Which of the following tools is most effective to choose the most appropriate risk response?

  • A. Project network diagrams
  • B. Delphi Technique
  • C. Decision tree analysis
  • D. Cause-and-effect diagrams

Answer: C

NEW QUESTION 11

Which of the following is used in asymmetric encryption?

  • A. Public key and user key
  • B. Public key and private key
  • C. SSL
  • D. NTFS

Answer: B

NEW QUESTION 12

Which of the following types of cipher encrypts alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword?

  • A. Block cipher
  • B. Transposition cipher
  • C. Vigen re cipher
  • D. Stream cipher

Answer: C

NEW QUESTION 13

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

  • A. Electronic Communications Privacy Act of 1986
  • B. Economic Espionage Act of 1996
  • C. Computer Fraud and Abuse Act
  • D. Wiretap Act

Answer: A

NEW QUESTION 14

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

  • A. Quantitative risk analysis
  • B. Risk audits
  • C. Qualitative risk analysis
  • D. Requested changes

Answer: D

NEW QUESTION 15

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?

  • A. Biometric devices
  • B. Intrusion detection systems
  • C. Key card
  • D. CCTV Cameras

Answer: D

NEW QUESTION 16

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

  • A. A DNS Zone
  • B. An Intranet
  • C. A demilitarized zone (DMZ)
  • D. A stub zone

Answer: C

NEW QUESTION 17

Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

  • A. Trademark laws
  • B. Patent laws
  • C. Copyright laws
  • D. Code Security law

Answer: B

NEW QUESTION 18
......

Recommend!! Get the Full GISF dumps in VCE and PDF From Allfreedumps.com, Welcome to Download: https://www.allfreedumps.com/GISF-dumps.html (New 333 Q&As Version)


START GISF EXAM