GISF Premium Bundle

GISF Premium Bundle

GIAC Information Security Fundamentals Certification Exam

4.5 
(55065 ratings)
333 QuestionsPractice Tests
333 PDFPrint version
September 29, 2024Last update

GIAC GISF Free Practice Questions

Exam Code: GISF (Practice Exam Latest Test Questions VCE PDF)
Exam Name: GIAC Information Security Fundamentals
Certification Provider: GIAC
Free Today! Guaranteed Training- Pass GISF Exam.

Online GIAC GISF free dumps demo Below:

NEW QUESTION 1

You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company's network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?

  • A. Teardrop attack
  • B. Replay attack
  • C. Denial-of-Service (DoS) attack
  • D. Polymorphic shell code attack

Answer: C

NEW QUESTION 2

Which of the following are the differences between routed protocols and routing protocols?
Each correct answer represents a complete solution. Choose two.

  • A. A routing protocol is configured on an interface and decides the method of packet delivery.
  • B. A routing protocol decides the path for a packet through the network.
  • C. A routed protocol is configured on an interface and decides how a packet will be delivered.
  • D. A routed protocol works on the transport layer of the OSI model.

Answer: BC

NEW QUESTION 3

Which of the following firewalls inspects the actual contents of packets?

  • A. Packet filtering firewall
  • B. Application-level firewall
  • C. Stateful inspection firewall
  • D. Circuit-level firewall

Answer: B

NEW QUESTION 4

Peter is a merchant. He uses symmetric encryption to send confidential messages to different users of his Web site. Which of the following is the other name for asymmetric encryption?

  • A. Session key encryption
  • B. Public key encryption
  • C. Secret key encryption
  • D. Shared key encryption

Answer: B

NEW QUESTION 5

You have an antivirus program for your network. It is dependent upon using lists of known viruses. What is this type of scan called?

  • A. Heuristic
  • B. Fixed List
  • C. Dictionary
  • D. Host Based

Answer: C

NEW QUESTION 6

Availability Management allows organizations to sustain the IT service availability to support the business at a justifiable cost. Which of the following elements of Availability Management is used to perform at an agreed level over a period of time?
Each correct answer represents a part of the solution. Choose all that apply.

  • A. Maintainability
  • B. Resilience
  • C. Error control
  • D. Recoverability
  • E. Reliability
  • F. Security
  • G. Serviceability

Answer: ABDEFG

NEW QUESTION 7

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

  • A. Packet filtering
  • B. Firewall
  • C. Intrusion detection system (IDS)
  • D. Demilitarized zone (DMZ)

Answer: C

NEW QUESTION 8

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?
* 1. To account for all IT assets
* 2. To provide precise information support to other ITIL disciplines
* 3. To provide a solid base only for Incident and Problem Management
* 4. To verify configuration records and correct any exceptions

  • A. 2 and 4 only
  • B. 1, 3, and 4 only
  • C. 1, 2, and 4 only
  • D. 2, 3, and 4 only

Answer: C

NEW QUESTION 9

Which of the following objects in an Active Directory serve as security principles? Each correct answer represents a part of the solution. Choose all that apply.

  • A. User accounts
  • B. Organizational units (OUs)
  • C. Computer accounts
  • D. Groups

Answer: ACD

NEW QUESTION 10

Which of the following is the maximum variable key length for the Blowfish encryption algorithm?

  • A. 448 bit
  • B. 256 bit
  • C. 64 bit
  • D. 16 bit

Answer: A

NEW QUESTION 11

You work in an enterprise as a Network Engineer. Your enterprise has a secure internal network.
You want to apply an additional network packet filtering device that is intermediate to your enterprise's internal network and the outer network (internet). Which of the following network zones will you create to accomplish this task?

  • A. Autonomous system area (AS)
  • B. Demilitarized zone (DMZ)
  • C. Border network area
  • D. Site network area

Answer: C

NEW QUESTION 12

A company would like your consulting firm to review its current network and suggest changes that will increase its efficiency and optimize the business processes.
To design such a network, you prepare a case study.
Which of the following policies should be implemented through a group policy that is associated with the netperfect.com domain?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose all that apply.

  • A. Account lockout policy.
  • B. Password policy.
  • C. Limit computers that can access production schedule software.
  • D. Assign MS Office suite to appropriate users.

Answer: ABD

NEW QUESTION 13

Which of the following statements about digital signature is true?

  • A. Digital signature is required for an e-mail message to get through a firewall.
  • B. Digital signature verifies the identity of the person who applies it to a document.
  • C. Digital signature decrypts the contents of documents.
  • D. Digital signature compresses the message to which it is applied.

Answer: B

NEW QUESTION 14

In packet filtering types of firewalls, which of the following specifies what traffic can and cannot traverse the firewall?

  • A. Internet bot
  • B. Access control list
  • C. ASDM
  • D. RIP

Answer: B

NEW QUESTION 15

Which of the following statements is not true about a digital certificate?

  • A. It is used with both public key encryption and private key encryption.
  • B. It is used with private key encryption.
  • C. It is neither used with public key encryption nor with private key encryption.
  • D. It is used with public key encryption.

Answer: D

NEW QUESTION 16

Which of the following protocols is used to prevent switching loops in networks with
redundant switched paths?

  • A. Cisco Discovery Protocol (CDP)
  • B. Spanning Tree Protocol (STP)
  • C. File Transfer Protocol (FTP)
  • D. VLAN Trunking Protocol (VTP)

Answer: B

NEW QUESTION 17

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

  • A. Organizing a solution to remove an incident
  • B. Building up an incident response kit
  • C. Working with QA to validate security of the enterprise
  • D. Setting up the initial position after an incident

Answer: B

NEW QUESTION 18
......

Recommend!! Get the Full GISF dumps in VCE and PDF From 2passeasy, Welcome to Download: https://www.2passeasy.com/dumps/GISF/ (New 333 Q&As Version)


START GISF EXAM