Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

GISF GIAC Information Security Fundamentals Questions and Answers

Questions 4

Which of the following types of authentications supported by OSPF?

Each correct answer represents a complete solution. Choose three.

Options:

A.

MD5 authentication

B.

Simple password authentication

C.

Null authentication

D.

Kerberos v5 authentication

Buy Now
Questions 5

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

Options:

A.

Install a DMZ firewall

B.

Enable verbose logging on the firewall

C.

Install a host-based IDS

D.

Install a network-based IDS

Buy Now
Questions 6

Rick works as a Network Administrator for Fimbry Hardware Inc. Based on the case study, which network routing strategy will he implement for the company? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

He will implement OSPF on all the router interfaces.

B.

He will implement RIP v1 on all the router interfaces.

C.

He will implement the IGMP on all the router interface.

D.

He will implement RIP v2 on all the router interfaces.

E.

He will implement static routes for the routers.

Buy Now
Questions 7

You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?

Options:

A.

Network Based

B.

Dictionary

C.

Heuristic

D.

Host based

Buy Now
Questions 8

You have decided to implement an intrusion detection system on your network. You primarily are interested in the IDS being able to recognized known attack techniques. Which type of IDS should you choose?

Options:

A.

Signature Based

B.

Passive

C.

Active

D.

Anomaly Based

Buy Now
Questions 9

Which of the following are the goals of the cryptographic systems?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Availability

B.

Authentication

C.

Confidentiality

D.

Integrity

Buy Now
Questions 10

You are the project manager of the HHH Project. The stakeholders for this project are scattered across the world and you need a method to promote interaction. You determine that a Web conferencing software would be the most cost effective solution. The stakeholders can watch a slide show while you walk them through the project details. The stakeholders can hear you, ask questions via a chat software, and post concerns. What is the danger in this presentation?

Options:

A.

55 percent of all communication is nonverbal and this approach does not provide non-verbal communications.

B.

The technology is not proven as reliable.

C.

The stakeholders won't really see you.

D.

The stakeholders are not required to attend the entire session.

Buy Now
Questions 11

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

Options:

A.

F936.28A1.5BCD.DEFA

B.

A3-07-B9-E3-BC-F9

C.

1011-0011-1010-1110-1100-0001

D.

132.298.1.23

Buy Now
Questions 12

You work as the Senior Project manager in Dotcoiss Inc. Your company has started a software project using configuration management and has completed 70% of it. You need to ensure that the network infrastructure devices and networking standards used in this project are installed in accordance with the requirements of its detailed project design documentation. Which of the following procedures will you employ to accomplish the task?

Options:

A.

Physical configuration audit

B.

Configuration control

C.

Functional configuration audit

D.

Configuration identification

Buy Now
Questions 13

Which of the following service provider classes is used to create a digital signature?

Options:

A.

RC2CryptoServiceProvider

B.

RNGCryptoServiceProvider

C.

DESCryptoServiceProvider

D.

SHA1CryptoServiceProvider

E.

MD5CryptoServiceProvider

F.

DSACryptoServiceProvider

Buy Now
Questions 14

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

Options:

A.

The application layer port numbers and the transport layer headers

B.

The presentation layer headers and the session layer port numbers

C.

The network layer headers and the session layer port numbers

D.

The transport layer port numbers and the application layer headers

Buy Now
Questions 15

Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Forward a copy of the spam to the ISP to make the ISP conscious of the spam.

B.

Send an email to the domain administrator responsible for the initiating IP address.

C.

Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.

D.

Close existing email account and open new email account.

Buy Now
Questions 16

You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

Options:

A.

By examining your firewall logs.

B.

By examining your domain controller server logs.

C.

By setting up a DMZ.

D.

You cannot, you need an IDS.

Buy Now
Questions 17

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

Options:

A.

Quantitative risk analysis

B.

Risk audits

C.

Qualitative risk analysis

D.

Requested changes

Buy Now
Questions 18

Which of the following monitors program activities and modifies malicious activities on a system?

Options:

A.

Back door

B.

HIDS

C.

RADIUS

D.

NIDS

Buy Now
Questions 19

You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?

Options:

A.

Use Incident handling

B.

Use OODA loop

C.

Use Information assurance

D.

Use SMART model.

Buy Now
Questions 20

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

Options:

A.

Electronic Communications Privacy Act of 1986

B.

Economic Espionage Act of 1996

C.

Computer Fraud and Abuse Act

D.

Wiretap Act

Buy Now
Questions 21

Adam works as a Professional Penetration Tester for Umbrella Inc. A project has been assigned to him to carry out a Black Box penetration testing as a regular evaluation of the system security and integrity of the company's network. Which of the following statements are true about the Black Box penetration testing?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Black box testing provides the testers with complete knowledge of the infrastructure to be tested.

B.

Black box testing simulates an attack from someone who is unfamiliar with the system.

C.

Black box testing simulates an attack from someone who is familiar with the system.

D.

Black box testing assumes no prior knowledge of the infrastructure to be tested.

Buy Now
Questions 22

Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?

Options:

A.

Preparation phase

B.

Eradication phase

C.

Differential phase

D.

Identification phase

Buy Now
Questions 23

Your corporate network uses a Proxy Server for Internet access. The Manufacturing group has access permission for WWW protocol in the Web Proxy service, and access permission for POP3 protocol, in the WinSock Proxy service. The Supervisors group has access permission for WWW and FTP Read protocols in the Web Proxy service, and access permission for the SMTP protocol in the WinSock Proxy service. The Quality Control group has access permission only for WWW protocol in the Web Proxy service. The Interns group has no permissions granted in any of the Proxy Server services. Kate is a member of all four groups. In the Proxy Server services, which protocols does Kate have permission to use?

Options:

A.

WWW only

B.

FTP Read and SMTP only

C.

WWW, FTP Read, POP3, and SMTP

D.

WWW and POP3 only

Buy Now
Questions 24

Which of the following types of viruses can prevent itself from being detected by an antivirus application?

Options:

A.

File virus

B.

Boot sector virus

C.

Multipartite virus

D.

Stealth virus

Buy Now
Questions 25

Which of the following is used to determine whether or not a principal is allowed to perform a requested action?

Options:

A.

Authentication

B.

Security policy

C.

Authorization

D.

Principal

Buy Now
Questions 26

Which of the following combines the characteristics of a bridge and a router?

Options:

A.

Firewall

B.

Brouter

C.

Switch

D.

Hub

E.

Repeater

Buy Now
Questions 27

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?

1. To account for all IT assets

2. To provide precise information support to other ITIL disciplines

3. To provide a solid base only for Incident and Problem Management

4. To verify configuration records and correct any exceptions

Options:

A.

2 and 4 only

B.

1, 3, and 4 only

C.

1, 2, and 4 only

D.

2, 3, and 4 only

Buy Now
Questions 28

You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?

Options:

A.

Reset Account Lockout Counter After policy

B.

Set Account Lockout Threshold policy

C.

Enforce Password Must Meet Complexity Requirements policy

D.

Set Account Lockout Duration policy

Buy Now
Questions 29

Which of the following protocols implements VPN using IPSec?

Options:

A.

SLIP

B.

PPTP

C.

PPP

D.

L2TP

Buy Now
Questions 30

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.

Options:

A.

Multipartite virus

B.

Boot sector virus

C.

File virus

D.

Stealth virus

E.

Polymorphic virus

Buy Now
Questions 31

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

TCP FTP proxy scanning

B.

Eavesdropping

C.

Fingerprinting

D.

Web ripping

Buy Now
Questions 32

Which of the following types of firewalls looks deep into packets and makes granular access control decisions?

Options:

A.

Stateful

B.

Application level proxy

C.

Circuit level proxy

D.

Packet filtering

Buy Now
Questions 33

Which of the following statements are true about routers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Routers do not limit physical broadcast traffic.

B.

Routers act as protocol translators and bind dissimilar networks.

C.

Routers organize addresses into classes, which are used to determine how to move packets from one network to another.

D.

Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.

Buy Now
Questions 34

Which of the following refers to a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens?

Options:

A.

Man-trap

B.

Man-in-the-middle

C.

Demilitarized zone (DMZ)

D.

Firewall

Buy Now
Questions 35

You want to install a server that can be accessed by external users. You also want to ensure that these users cannot access the rest of the network. Where will you place the server?

Options:

A.

Intranet

B.

Local Area Network

C.

Internet

D.

Demilitarized Zone

E.

Extranet

F.

Wide Area Network

Buy Now
Questions 36

Which of the following firewalls operates at three layers- Layer3, Layer4, and Layer5?

Options:

A.

Circuit-level firewall

B.

Application layer firewall

C.

Proxy firewall

D.

Dynamic packet-filtering firewall

Buy Now
Exam Code: GISF
Exam Name: GIAC Information Security Fundamentals
Last Update: May 13, 2024
Questions: 333
GISF pdf

GISF PDF

$28  $80
GISF Engine

GISF Testing Engine

$33.25  $95
GISF PDF + Engine

GISF PDF + Testing Engine

$45.5  $130