15 July, 2024
What Breathing GISF Free Practice Test Is
Act now and download your GIAC GISF test today! Do not waste time for the worthless GIAC GISF tutorials. Download Replace GIAC GIAC Information Security Fundamentals exam with real questions and answers and begin to learn GIAC GISF with a classic professional.
Question 1
- (Topic 1)
Which of the following tools can be used to perform tasks such as Windows password cracking Windows enumeration, and VoIP session sniffing?
Which of the following tools can be used to perform tasks such as Windows password cracking Windows enumeration, and VoIP session sniffing?
Question 2
- (Topic 2)
You work as the Network Administrator of TechJobs. You implement a security policy, to be in effect at all times, on the client computer in your network. While troubleshooting, assistant administrators often change security settings on the network. You want the security policy to be reapplied after changes have been made. How can you automate this task? (Click the Exhibit button on the toolbar to see the case study.)
You work as the Network Administrator of TechJobs. You implement a security policy, to be in effect at all times, on the client computer in your network. While troubleshooting, assistant administrators often change security settings on the network. You want the security policy to be reapplied after changes have been made. How can you automate this task? (Click the Exhibit button on the toolbar to see the case study.)
Question 3
- (Topic 1)
You have successfully installed an IRM server into your environment. This IRM server will be utilized to protect the company's videos, which are available to all employees but contain sensitive data. You log on to the WSS 3.0 server with administrator permissions and navigate to the Operations section. What option should you now choose so that you can input the RMS server name for the WSS 3.0 server to use?
You have successfully installed an IRM server into your environment. This IRM server will be utilized to protect the company's videos, which are available to all employees but contain sensitive data. You log on to the WSS 3.0 server with administrator permissions and navigate to the Operations section. What option should you now choose so that you can input the RMS server name for the WSS 3.0 server to use?
Question 4
- (Topic 1)
Which of the following protocols work at the Network layer of the OSI model?
Which of the following protocols work at the Network layer of the OSI model?
Question 5
- (Topic 2)
Which of the following tools can be used for stress testing of a Web server? Each correct answer represents a complete solution. Choose two.
Which of the following tools can be used for stress testing of a Web server? Each correct answer represents a complete solution. Choose two.
Question 6
- (Topic 1)
Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?
Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?
Question 7
- (Topic 2)
How should you configure USSOWA1 and USSTIME1 to allow secure access for remote employees?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose three.
How should you configure USSOWA1 and USSTIME1 to allow secure access for remote employees?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose three.
Question 8
- (Topic 3)
You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?
You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?
Question 9
- (Topic 1)
Which of the following are the differences between routed protocols and routing protocols?
Each correct answer represents a complete solution. Choose two.
Which of the following are the differences between routed protocols and routing protocols?
Each correct answer represents a complete solution. Choose two.
Question 10
- (Topic 2)
Which of the following statements are true about classless routing protocols? Each correct answer represents a complete solution. Choose two.
Which of the following statements are true about classless routing protocols? Each correct answer represents a complete solution. Choose two.
Question 11
- (Topic 1)
Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?
Each correct answer represents a complete solution. Choose all that apply.
Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?
Each correct answer represents a complete solution. Choose all that apply.
Question 12
- (Topic 2)
Which of the following is the maximum variable key length for the Blowfish encryption algorithm?
Which of the following is the maximum variable key length for the Blowfish encryption algorithm?
Question 13
- (Topic 1)
Which of the following factors determine the strength of the encryption?
Which of the following factors determine the strength of the encryption?
Question 14
- (Topic 1)
The SALES folder has a file named XFILE.DOC that contains critical information about your company. This folder resides on an NTFS volume. The company's Senior Sales Manager asks you to provide security for that file. You make a backup of that file and keep it in a locked cupboard, and then you deny access on the file for the Sales group. John, a member of the Sales group, accidentally deletes that file. You have verified that John is not a member of any other group.
Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file.
What is the most likely cause?
The SALES folder has a file named XFILE.DOC that contains critical information about your company. This folder resides on an NTFS volume. The company's Senior Sales Manager asks you to provide security for that file. You make a backup of that file and keep it in a locked cupboard, and then you deny access on the file for the Sales group. John, a member of the Sales group, accidentally deletes that file. You have verified that John is not a member of any other group.
Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file.
What is the most likely cause?
Question 15
- (Topic 2)
You discover that someone has been logging onto your network after office hours. After investigating this you find the login belongs to someone who left the company 12 months ago. What would have been the best method to prevent this?
You discover that someone has been logging onto your network after office hours. After investigating this you find the login belongs to someone who left the company 12 months ago. What would have been the best method to prevent this?
Question 16
- (Topic 2)
Which of the following can be used to prevent routing loops in distance vector routing protocols?
Each correct answer represents a complete solution. Choose two.
Which of the following can be used to prevent routing loops in distance vector routing protocols?
Each correct answer represents a complete solution. Choose two.
Question 17
- (Topic 1)
You work as a Software Developer for Mansoft Inc. You create an application. You want to use the application to encrypt data. You use the HashAlgorithmType enumeration to specify the algorithm used for generating Message Authentication Code (MAC) in Secure Sockets Layer (SSL) communications.
Which of the following are valid values for HashAlgorithmType enumeration? Each correct answer represents a part of the solution. Choose all that apply.
You work as a Software Developer for Mansoft Inc. You create an application. You want to use the application to encrypt data. You use the HashAlgorithmType enumeration to specify the algorithm used for generating Message Authentication Code (MAC) in Secure Sockets Layer (SSL) communications.
Which of the following are valid values for HashAlgorithmType enumeration? Each correct answer represents a part of the solution. Choose all that apply.
Question 18
- (Topic 1)
Which of the following is not needed for effective procurement planning?
Which of the following is not needed for effective procurement planning?
Question 19
- (Topic 2)
Which of the following is the primary function of VPNs?
Which of the following is the primary function of VPNs?