03 July, 2024
How Many Questions Of GISF Study Guide
Cause all that matters here is passing the GIAC GISF exam. Cause all that you need is a high score of GISF GIAC Information Security Fundamentals exam. The only one thing you need to do is downloading Ucertify GISF exam study guides now. We will not let you down with our money-back guarantee.
Question 1
- (Topic 1)
Which of the following is a valid IP address for class B Networks?
Which of the following is a valid IP address for class B Networks?
Question 2
- (Topic 3)
Which of the following is used in asymmetric encryption?
Which of the following is used in asymmetric encryption?
Question 3
- (Topic 1)
Which of the following terms is used for a router that filters traffic before it is passed to the firewall?
Which of the following terms is used for a router that filters traffic before it is passed to the firewall?
Question 4
- (Topic 3)
Which of the following wireless security features provides the best wireless security mechanism?
Which of the following wireless security features provides the best wireless security mechanism?
Question 5
- (Topic 1)
You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?
You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?
Question 6
- (Topic 2)
Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?
Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?
Question 7
- (Topic 2)
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?
Question 8
- (Topic 2)
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
Question 9
- (Topic 2)
Which of the following encryption techniques does digital signatures use?
Which of the following encryption techniques does digital signatures use?
Question 10
- (Topic 1)
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?
Question 11
- (Topic 1)
Which of the following statements about testing are true?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about testing are true?
Each correct answer represents a complete solution. Choose all that apply.
Question 12
- (Topic 1)
Which of the following statements about asymmetric encryption are true? Each correct answer represents a complete solution. Choose two.
Which of the following statements about asymmetric encryption are true? Each correct answer represents a complete solution. Choose two.
Question 13
- (Topic 3)
You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of _____.
You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of _____.
Question 14
- (Topic 3)
You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be
involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.
You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be
involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.
Question 15
- (Topic 2)
Which of the following is NOT a phase of the OODA Loop strategy?
Which of the following is NOT a phase of the OODA Loop strategy?
Question 16
- (Topic 1)
You work as a Security manager for Qualoxizz Inc. Your company has number of network switches in the site network infrastructure. Which of the following actions will you perform to ensure the security of the switches in your company?
You work as a Security manager for Qualoxizz Inc. Your company has number of network switches in the site network infrastructure. Which of the following actions will you perform to ensure the security of the switches in your company?
Question 17
- (Topic 2)
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
Question 18
- (Topic 2)
Which of the following refers to encrypted text?
Which of the following refers to encrypted text?
Question 19
- (Topic 2)
What are the benefits of using a proxy server on a network?
Each correct answer represents a complete solution. Choose all that apply.
What are the benefits of using a proxy server on a network?
Each correct answer represents a complete solution. Choose all that apply.