How Many Questions Of GISF Study Guide

Cause all that matters here is passing the GIAC GISF exam. Cause all that you need is a high score of GISF GIAC Information Security Fundamentals exam. The only one thing you need to do is downloading Ucertify GISF exam study guides now. We will not let you down with our money-back guarantee.

Page: 1 / 27
Total 333 questions Full Exam Access
Question 1
- (Topic 1)
Which of the following is a valid IP address for class B Networks?
My answer: -
Reference answer: A
Reference analysis:

None

Question 2
- (Topic 3)
Which of the following is used in asymmetric encryption?
My answer: -
Reference answer: B
Reference analysis:

None

Question 3
- (Topic 1)
Which of the following terms is used for a router that filters traffic before it is passed to the firewall?
My answer: -
Reference answer: A
Reference analysis:

None

Question 4
- (Topic 3)
Which of the following wireless security features provides the best wireless security mechanism?
My answer: -
Reference answer: A
Reference analysis:

None

Question 5
- (Topic 1)
You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?
My answer: -
Reference answer: A
Reference analysis:

None

Question 6
- (Topic 2)
Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?
My answer: -
Reference answer: B
Reference analysis:

None

Question 7
- (Topic 2)
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?
My answer: -
Reference answer: D
Reference analysis:

None

Question 8
- (Topic 2)
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
My answer: -
Reference answer: B
Reference analysis:

None

Question 9
- (Topic 2)
Which of the following encryption techniques does digital signatures use?
My answer: -
Reference answer: C
Reference analysis:

None

Question 10
- (Topic 1)
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?
My answer: -
Reference answer: D
Reference analysis:

None

Question 11
- (Topic 1)
Which of the following statements about testing are true?
Each correct answer represents a complete solution. Choose all that apply.
My answer: -
Reference answer: BCD
Reference analysis:

None

Question 12
- (Topic 1)
Which of the following statements about asymmetric encryption are true? Each correct answer represents a complete solution. Choose two.
My answer: -
Reference answer: BD
Reference analysis:

None

Question 13
- (Topic 3)
You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of _____.
My answer: -
Reference answer: D
Reference analysis:

None

Question 14
- (Topic 3)
You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be
involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.
My answer: -
Reference answer: ABD
Reference analysis:

None

Question 15
- (Topic 2)
Which of the following is NOT a phase of the OODA Loop strategy?
My answer: -
Reference answer: B
Reference analysis:

None

Question 16
- (Topic 1)
You work as a Security manager for Qualoxizz Inc. Your company has number of network switches in the site network infrastructure. Which of the following actions will you perform to ensure the security of the switches in your company?
My answer: -
Reference answer: D
Reference analysis:

None

Question 17
- (Topic 2)
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
My answer: -
Reference answer: D
Reference analysis:

None

Question 18
- (Topic 2)
Which of the following refers to encrypted text?
My answer: -
Reference answer: C
Reference analysis:

None

Question 19
- (Topic 2)
What are the benefits of using a proxy server on a network?
Each correct answer represents a complete solution. Choose all that apply.
My answer: -
Reference answer: AB
Reference analysis:

None

Page: 1 / 27
Total 333 questions Full Exam Access