All About Certified GISF Testing Engine

Exam Code: GISF (Practice Exam Latest Test Questions VCE PDF)
Exam Name: GIAC Information Security Fundamentals
Certification Provider: GIAC
Free Today! Guaranteed Training- Pass GISF Exam.

Page: 1 / 27
Total 333 questions Full Exam Access
Question 1
- (Topic 2)
Which of the following types of cipher encrypts alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword?
My answer: -
Reference answer: C
Reference analysis:

None

Question 2
- (Topic 1)
Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?
My answer: -
Reference answer: D
Reference analysis:

None

Question 3
- (Topic 2)
Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult?
My answer: -
Reference answer: C
Reference analysis:

None

Question 4
- (Topic 1)
John works as an Exchange Administrator for Apple Inc. The company has a Windows 2003 Active Directory domain-based network. The network contains several Windows Server 2003 servers. Three of them have been configured as domain controllers. John complains to the Network Administrator that he is unable to manage group memberships. Which of the following operations master roles is responsible for managing group memberships?
My answer: -
Reference answer: B
Reference analysis:

None

Question 5
- (Topic 1)
Which of the following provides a credential that can be used by all Kerberos-enabled servers and applications?
My answer: -
Reference answer: D
Reference analysis:

None

Question 6
- (Topic 3)
Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?
My answer: -
Reference answer: C
Reference analysis:

None

Question 7
- (Topic 2)
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.
My answer: -
Reference answer: ACD
Reference analysis:

None

Question 8
- (Topic 2)
Adam works as a Professional Penetration Tester for Umbrella Inc. A project has been assigned to him to carry out a Black Box penetration testing as a regular evaluation of the system security and integrity of the company's network. Which of the following statements are true about the Black Box penetration testing?
Each correct answer represents a complete solution. Choose all that apply.
My answer: -
Reference answer: BC
Reference analysis:

None

Question 9
- (Topic 2)
The executive team wants you to track labor costs for your project as well as progress on task completion and the resulting dates. What information must you update for tasks to provide this information?
My answer: -
Reference answer: C
Reference analysis:

None

Question 10
- (Topic 2)
Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.
My answer: -
Reference answer: BC
Reference analysis:

None

Question 11
- (Topic 1)
Hardening a system is one of the practical methods of securing a computer system. Which of the following techniques is used for hardening a computer system?
My answer: -
Reference answer: D
Reference analysis:

None

Question 12
- (Topic 2)
Jane works as a Consumer Support Technician for McRoberts Inc. The company provides troubleshooting support to users. A user named Peter installs Windows Vista on his computer. He connects his computer on the network. He wants to protect his computer from malicious software and prevent hackers from gaining access to his computer through the network. Which of the following actions will Jane assist Peter to perform to accomplish the task?
My answer: -
Reference answer: B
Reference analysis:

None

Question 13
- (Topic 3)
Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?
My answer: -
Reference answer: A
Reference analysis:

None

Question 14
- (Topic 2)
You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.
He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?
My answer: -
Reference answer: C
Reference analysis:

None

Question 15
- (Topic 1)
You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?
My answer: -
Reference answer: D
Reference analysis:

None

Question 16
- (Topic 1)
Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?
My answer: -
Reference answer: B
Reference analysis:

None

Question 17
- (Topic 3)
John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?
My answer: -
Reference answer: A
Reference analysis:

None

Question 18
- (Topic 1)
TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?
My answer: -
Reference answer: A
Reference analysis:

None

Question 19
- (Topic 1)
Which of the following are the goals of the cryptographic systems? Each correct answer represents a complete solution. Choose three.
My answer: -
Reference answer: BCD
Reference analysis:

None

Page: 1 / 27
Total 333 questions Full Exam Access