What Breathing GISF Free Practice Test Is

Act now and download your GIAC GISF test today! Do not waste time for the worthless GIAC GISF tutorials. Download Replace GIAC GIAC Information Security Fundamentals exam with real questions and answers and begin to learn GIAC GISF with a classic professional.

Page: 1 / 27
Total 333 questions Full Exam Access
Question 1
- (Topic 1)
Which of the following tools can be used to perform tasks such as Windows password cracking Windows enumeration, and VoIP session sniffing?
My answer: -
Reference answer: C
Reference analysis:

None

Question 2
- (Topic 2)
You work as the Network Administrator of TechJobs. You implement a security policy, to be in effect at all times, on the client computer in your network. While troubleshooting, assistant administrators often change security settings on the network. You want the security policy to be reapplied after changes have been made. How can you automate this task? (Click the Exhibit button on the toolbar to see the case study.)
My answer: -
Reference answer: D
Reference analysis:

None

Question 3
- (Topic 1)
You have successfully installed an IRM server into your environment. This IRM server will be utilized to protect the company's videos, which are available to all employees but contain sensitive data. You log on to the WSS 3.0 server with administrator permissions and navigate to the Operations section. What option should you now choose so that you can input the RMS server name for the WSS 3.0 server to use?
My answer: -
Reference answer: C
Reference analysis:

None

Question 4
- (Topic 1)
Which of the following protocols work at the Network layer of the OSI model?
My answer: -
Reference answer: AC
Reference analysis:

None

Question 5
- (Topic 2)
Which of the following tools can be used for stress testing of a Web server? Each correct answer represents a complete solution. Choose two.
My answer: -
Reference answer: AC
Reference analysis:

None

Question 6
- (Topic 1)
Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?
My answer: -
Reference answer: D
Reference analysis:

None

Question 7
- (Topic 2)
How should you configure USSOWA1 and USSTIME1 to allow secure access for remote employees?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose three.
My answer: -
Reference answer: DEF
Reference analysis:

None

Question 8
- (Topic 3)
You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?
My answer: -
Reference answer: C
Reference analysis:

None

Question 9
- (Topic 1)
Which of the following are the differences between routed protocols and routing protocols?
Each correct answer represents a complete solution. Choose two.
My answer: -
Reference answer: BC
Reference analysis:

None

Question 10
- (Topic 2)
Which of the following statements are true about classless routing protocols? Each correct answer represents a complete solution. Choose two.
My answer: -
Reference answer: AC
Reference analysis:

None

Question 11
- (Topic 1)
Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?
Each correct answer represents a complete solution. Choose all that apply.
My answer: -
Reference answer: AC
Reference analysis:

None

Question 12
- (Topic 2)
Which of the following is the maximum variable key length for the Blowfish encryption algorithm?
My answer: -
Reference answer: A
Reference analysis:

None

Question 13
- (Topic 1)
Which of the following factors determine the strength of the encryption?
My answer: -
Reference answer: B
Reference analysis:

None

Question 14
- (Topic 1)
The SALES folder has a file named XFILE.DOC that contains critical information about your company. This folder resides on an NTFS volume. The company's Senior Sales Manager asks you to provide security for that file. You make a backup of that file and keep it in a locked cupboard, and then you deny access on the file for the Sales group. John, a member of the Sales group, accidentally deletes that file. You have verified that John is not a member of any other group.
Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file.
What is the most likely cause?
My answer: -
Reference answer: A
Reference analysis:

None

Question 15
- (Topic 2)
You discover that someone has been logging onto your network after office hours. After investigating this you find the login belongs to someone who left the company 12 months ago. What would have been the best method to prevent this?
My answer: -
Reference answer: C
Reference analysis:

None

Question 16
- (Topic 2)
Which of the following can be used to prevent routing loops in distance vector routing protocols?
Each correct answer represents a complete solution. Choose two.
My answer: -
Reference answer: AD
Reference analysis:

None

Question 17
- (Topic 1)
You work as a Software Developer for Mansoft Inc. You create an application. You want to use the application to encrypt data. You use the HashAlgorithmType enumeration to specify the algorithm used for generating Message Authentication Code (MAC) in Secure Sockets Layer (SSL) communications.
Which of the following are valid values for HashAlgorithmType enumeration? Each correct answer represents a part of the solution. Choose all that apply.
My answer: -
Reference answer: ABE
Reference analysis:

None

Question 18
- (Topic 1)
Which of the following is not needed for effective procurement planning?
My answer: -
Reference answer: D
Reference analysis:

None

Question 19
- (Topic 2)
Which of the following is the primary function of VPNs?
My answer: -
Reference answer: A
Reference analysis:

None

Page: 1 / 27
Total 333 questions Full Exam Access