Top Tips Of Renew GISF Free Practice Questions

It is more faster and easier to pass the GIAC GISF exam by using Top Quality GIAC GIAC Information Security Fundamentals questuins and answers. Immediate access to the Most recent GISF Exam and find the same core area GISF questions with professionally verified answers, then PASS your exam with a high score now.

Page: 1 / 27
Total 333 questions Full Exam Access
Question 1
- (Topic 1)
Which of the following are application layer protocols of Internet protocol (IP) suite? Each correct answer represents a complete solution. Choose two.
My answer: -
Reference answer: CD
Reference analysis:

None

Question 2
- (Topic 2)
You work as a Product manager for Marioiss Inc. You have been tasked to start a project for securing the network of your company. You want to employ configuration management to efficiently manage the procedures of the project. What will be the benefits of employing configuration management for completing this project?
Each correct answer represents a complete solution. Choose all that apply.
My answer: -
Reference answer: CD
Reference analysis:

None

Question 3
- (Topic 2)
You work as a Network Administrator for Tech Perfect Inc. The company has recruited a large number of fresh employees. You have been asked to give them a presentation on data protection and confidentiality to ensure a secure wireless communication between the employees. What types of information require confidentiality? Each correct answer represents a complete solution. Choose all that apply.
My answer: -
Reference answer: BCD
Reference analysis:

None

Question 4
- (Topic 1)
Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?
Each correct answer represents a complete solution. Choose all that apply.
My answer: -
Reference answer: ACD
Reference analysis:

None

Question 5
- (Topic 1)
Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer?
My answer: -
Reference answer: B
Reference analysis:

None

Question 6
- (Topic 2)
Which of the following are the types of access controls?
Each correct answer represents a complete solution. Choose three.
My answer: -
Reference answer: ABD
Reference analysis:

None

Question 7
- (Topic 2)
John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
My answer: -
Reference answer: AC
Reference analysis:

None

Question 8
- (Topic 2)
Which of the following tools is an open source protocol analyzer that can capture traffic in real time?
My answer: -
Reference answer: B
Reference analysis:

None

Question 9
- (Topic 1)
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus.
Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?
My answer: -
Reference answer: D
Reference analysis:

None

Question 10
- (Topic 1)
Which of the following protocols provides secured transaction of data between two computers?
My answer: -
Reference answer: A
Reference analysis:

None

Question 11
- (Topic 2)
This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as .
My answer: -
Reference answer: C
Reference analysis:

None

Question 12
- (Topic 1)
Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?
My answer: -
Reference answer: C
Reference analysis:

None

Question 13
- (Topic 1)
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?
My answer: -
Reference answer: C
Reference analysis:

None

Question 14
- (Topic 2)
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you want to apply Windows firewall setting to all the computers in the domain to improve security.
Which of the following is the fastest and the most effective way to accomplish the task?
My answer: -
Reference answer: C
Reference analysis:

None

Question 15
- (Topic 2)
Donna is the project manager for her organization. She is preparing a plan to manage changes to the project should changes be requested. Her change management plan defines the process for documenting, tracking, and determining if the changes should be approved or declined. What system is considered the parent of the change control system documented in Donna's plan?
My answer: -
Reference answer: A
Reference analysis:

None

Question 16
- (Topic 1)
Mark work as a Network Administrator for Roadways Travel Inc. The conmpany wants to implement a strategy for its external employees so that they can connect to Web based applications. What will Mark do to achieve this?
(Click the Exhibit button on the toolbar to see the case study.)
My answer: -
Reference answer: C
Reference analysis:

None

Question 17
- (Topic 2)
Which of the following categories of the network management model is used to detect and log network problems or device failures?
My answer: -
Reference answer: A
Reference analysis:

None

Question 18
- (Topic 3)
Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?
My answer: -
Reference answer: D
Reference analysis:

None

Question 19
- (Topic 2)
Which of the following security applications is used to secure a database from unauthorized accesses in a network infrastructure?
My answer: -
Reference answer: D
Reference analysis:

None

Page: 1 / 27
Total 333 questions Full Exam Access