GISF Premium Bundle

GISF Premium Bundle

GIAC Information Security Fundamentals Certification Exam

4.5 
(55080 ratings)
333 QuestionsPractice Tests
333 PDFPrint version
September 29, 2024Last update

GIAC GISF Free Practice Questions

we provide Accurate GIAC GISF exam prep which are the best for clearing GISF test, and to get certified by GIAC GIAC Information Security Fundamentals. The GISF Questions & Answers covers all the knowledge points of the real GISF exam. Crack your GIAC GISF Exam with latest dumps, guaranteed!

Online GISF free questions and answers of New Version:

NEW QUESTION 1

Rick works as a Network Administrator for Fimbry Hardware Inc. Based on the case study, which network routing strategy will he implement for the company? (Click the Exhibit button
on the toolbar to see the case study.)

  • A. He will implement OSPF on all the router interfaces.
  • B. He will implement RIP v1 on all the router interfaces.
  • C. He will implement the IGMP on all the router interface.
  • D. He will implement RIP v2 on all the router interfaces.
  • E. He will implement static routes for the routers.

Answer: E

NEW QUESTION 2

You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of _____.

  • A. Bribery
  • B. Irresponsible practice
  • C. Illegal practice
  • D. Conflict of interest

Answer: D

NEW QUESTION 3

You have purchased a wireless router for your home network. What will you do first to enhance the security?

  • A. Change the default password and administrator's username on the router
  • B. Disable the network interface card on the computer
  • C. Configure DMZ on the router
  • D. Assign a static IP address to the computers

Answer: A

NEW QUESTION 4

You are the project manager of the HHH Project. The stakeholders for this project are scattered across the world and you need a method to promote interaction. You determine that a Web conferencing software would be the most cost effective solution. The stakeholders can watch a slide show while you walk them through the project details. The stakeholders can hear you, ask questions via a chat software, and post concerns. What is the danger in this presentation?

  • A. 55 percent of all communication is nonverbal and this approach does not provide non- verbal communications.
  • B. The technology is not proven as reliable.
  • C. The stakeholders won't really see you.
  • D. The stakeholders are not required to attend the entire session.

Answer: A

NEW QUESTION 5

In which type of access control do user ID and password system come under?

  • A. Physical
  • B. Power
  • C. Technical
  • D. Administrative

Answer: C

NEW QUESTION 6

How long are cookies in effect if no expiration date is set?

  • A. Fifteen days
  • B. Until the session ends.
  • C. Forever
  • D. One year

Answer: B

NEW QUESTION 7

The SALES folder has a file named XFILE.DOC that contains critical information about your company. This folder resides on an NTFS volume. The company's Senior Sales Manager asks you to provide security for that file. You make a backup of that file and keep it in a locked cupboard, and then you deny access on the file for the Sales group. John, a member of the Sales group, accidentally deletes that file. You have verified that John is not a member of any other group.
Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file.
What is the most likely cause?

  • A. The Sales group has the Full Control permission on the SALES folder.
  • B. The Deny Access permission does not work on files.
  • C. The Deny Access permission does not restrict the deletion of files.
  • D. John is a member of another group having the Full Control permission on that file.

Answer: A

NEW QUESTION 8

Which of the following combines the characteristics of a bridge and a router?

  • A. Firewall
  • B. Brouter
  • C. Switch
  • D. Hub
  • E. Repeater

Answer: B

NEW QUESTION 9

You are a Product manager of Marioxiss Inc. Your company management is having a conflict with another company Texasoftg Inc. over an issue of security policies. Your legal advisor has prepared a document that includes the negotiation of views for both the companies. This solution is supposed to be the key for conflict resolution. Which of the following are the forms of conflict resolution that have been employed by the legal advisor?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Orientation
  • B. Mediation
  • C. Negotiation
  • D. Arbitration

Answer: BCD

NEW QUESTION 10

What is VeriSign?

  • A. It is a data warehouse.
  • B. It is an e-commerce portal.
  • C. It is a search engine.
  • D. It is a payment gateway.

Answer: D

NEW QUESTION 11

You work as a security manager in Mariotiss Inc. Your enterprise has been facing network and software security threats since a few months. You want to renew your current security policies and management to enhance the safety of your information systems. Which of the following is the best practice to initiate the renewal process from the lowest level with the least managerial effort?

  • A. Start the Incident handling process.
  • B. Change the entire security policy.
  • C. Perform an IT audit.
  • D. Switch to a new network infrastructure.

Answer: C

NEW QUESTION 12

Which of the following network connectivity devices translates one protocol into another and is used to connect dissimilar network technologies?

  • A. Hub
  • B. Firewall
  • C. Bridge
  • D. Gateway

Answer: D

NEW QUESTION 13

Which of the following refers to the emulation of the identity of a network computer by an attacking computer?

  • A. Spoofing
  • B. PING attack
  • C. Hacking
  • D. SYN attack

Answer: A

NEW QUESTION 14

Mark work as a Network Administrator for Roadways Travel Inc. The conmpany wants to implement a strategy for its external employees so that they can connect to Web based applications. What will Mark do to achieve this?
(Click the Exhibit button on the toolbar to see the case study.)

  • A. He will install a VPN server in the VLAN, Roadways, and an IIS server in the corporate LAN at the headquarters.
  • B. He will install a VPN server in the corporate LAN at the headquarters and an IIS server in the DMZ.
  • C. He will install a VPN server in the DMZ and an IIS server in the corporate LAN at the headquarters.
  • D. He will install a VPN server in the VLAN, Roadways, and an IIS server in the DMZ.

Answer: C

NEW QUESTION 15

Which of the following does an anti-virus program update regularly from its manufacturer's Web site?

  • A. Hotfixes
  • B. Definition
  • C. Service packs
  • D. Permissions

Answer: B

NEW QUESTION 16

You want to ensure that everyone who sends you an email should encrypt it. However you do not wish to exchange individual keys with all people who send you emails. In order to accomplish this goal which of the following should you choose?

  • A. DES
  • B. AES
  • C. Symmetric Encryption
  • D. Public Key encryption

Answer: D

NEW QUESTION 17

Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?

  • A. Asymmetric
  • B. Symmetric
  • C. Numeric
  • D. Hashing

Answer: B

NEW QUESTION 18
......

P.S. Certshared now are offering 100% pass ensure GISF dumps! All GISF exam questions have been updated with correct answers: https://www.certshared.com/exam/GISF/ (333 New Questions)


START GISF EXAM