★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW GISF Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/GISF-dumps.html
Want to know Actualtests GISF Exam practice test features? Want to lear more about GIAC GIAC Information Security Fundamentals certification experience? Study Practical GIAC GISF answers to Leading GISF questions at Actualtests. Gat a success with an absolute guarantee to pass GIAC GISF (GIAC Information Security Fundamentals) test on your first attempt.
Also have GISF free dumps questions for you:
NEW QUESTION 1
Which of the following is the process of making additional copies of data so that they may be used to restore the original after a data loss event?
- A. Data mining
- B. Back-up
- C. Data recovery
- D. File storage
Answer: B
NEW QUESTION 2
Which of the following is prepared by the business and serves as a starting point for producing the IT Service Continuity Strategy?
- A. Disaster Invocation Guideline
- B. Business Continuity Strategy
- C. Index of Disaster-Relevant Information
- D. Availability/ ITSCM/ Security Testing Schedule
Answer: B
NEW QUESTION 3
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?
- A. SHA
- B. AES
- C. MD5
- D. DES
Answer: C
NEW QUESTION 4
You have successfully installed an IRM server into your environment. This IRM server will be utilized to protect the company's videos, which are available to all employees but contain sensitive data. You log on to the WSS 3.0 server with administrator permissions and navigate to the Operations section. What option should you now choose so that you can input the RMS server name for the WSS 3.0 server to use?
- A. Self-service site management
- B. Content databases
- C. Information Rights Management
- D. Define managed paths
Answer: C
NEW QUESTION 5
A company would like your consulting firm to review its current network and suggest changes that will increase its efficiency and optimize the business processes.
To design such a network, you prepare a case study.
Which of the following policies should be implemented through a group policy that is associated with the netperfect.com domain?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose all that apply.
- A. Account lockout policy.
- B. Password policy.
- C. Limit computers that can access production schedule software.
- D. Assign MS Office suite to appropriate users.
Answer: ABD
NEW QUESTION 6
You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?
- A. Apply firewalls at appropriate spots.
- B. Download and install new firmware patch for the router.
- C. Disable the SSID broadcast feature of the router.
- D. Apply a standard ACL on the router.
Answer: C
NEW QUESTION 7
Which of the following is the maximum variable key length for the Blowfish encryption algorithm?
- A. 448 bit
- B. 256 bit
- C. 64 bit
- D. 16 bit
Answer: A
NEW QUESTION 8
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you want to apply Windows firewall setting to all the computers in the domain to improve security.
Which of the following is the fastest and the most effective way to accomplish the task?
- A. Apply firewall settings manually.
- B. Apply firewall settings on the domain controller of the domain.
- C. Use group policy to apply firewall settings.
- D. Use a batch file to apply firewall setting.
Answer: C
NEW QUESTION 9
Your company is going to add wireless connectivity to the existing LAN. You have concerns about the security of the wireless access and wish to implement encryption. Which of the following would be the best choice for you to use?
- A. WAP
- B. WEP
- C. DES
- D. PKI
Answer: B
NEW QUESTION 10
How long are cookies in effect if no expiration date is set?
- A. Fifteen days
- B. Until the session ends.
- C. Forever
- D. One year
Answer: B
NEW QUESTION 11
You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.
He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?
- A. Malware protection
- B. Automatic updating
- C. Firewall
- D. Other security settings
Answer: C
NEW QUESTION 12
Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?
Each correct answer represents a complete solution. Choose all that apply.
- A. Address Resolution Protocol (ARP)
- B. Network Link Protocol (NWLink)
- C. User Datagram Protocol (UDP)
- D. Internet Control Message Protocol (ICMP)
Answer: ACD
NEW QUESTION 13
You work as a Software Developer for uCertify Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?
- A. Cryptographer
- B. Cryptographic toolkit
- C. Cryptosystem
- D. Cryptanalyst
Answer: C
NEW QUESTION 14
The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?
- A. Biometric devices
- B. Intrusion detection systems
- C. Key card
- D. CCTV Cameras
Answer: D
NEW QUESTION 15
In packet filtering types of firewalls, which of the following specifies what traffic can and cannot traverse the firewall?
- A. Internet bot
- B. Access control list
- C. ASDM
- D. RIP
Answer: B
NEW QUESTION 16
In which type of access control do user ID and password system come under?
- A. Physical
- B. Power
- C. Technical
- D. Administrative
Answer: C
NEW QUESTION 17
Web applications play a vital role in deploying different databases with user accessibility on the Internet. Which of the following allows an attacker to get unauthorized access to the database of a Web application by sending (attacking) user-supplied data to an interpreter as part of a command or query?
- A. Cross Site Scripting
- B. Injection flaw
- C. Cross Site Request Forgery (CSRF)
- D. Malicious File Execution
Answer: B
NEW QUESTION 18
Which term best describes an e-mail that contains incorrect and misleading information or warnings about viruses?
- A. Blowfish
- B. Spam
- C. Virus
- D. Trojan horse
- E. Hoax
- F. Rlogin
Answer: E
NEW QUESTION 19
Which of the following are used as primary technologies to create a layered defense for giving protection to a network?
Each correct answer represents a complete solution. Choose all that apply.
- A. Vulnerability
- B. Firewall
- C. Endpoint authentication
- D. IDS
Answer: BCD
NEW QUESTION 20
......
P.S. Certshared now are offering 100% pass ensure GISF dumps! All GISF exam questions have been updated with correct answers: https://www.certshared.com/exam/GISF/ (333 New Questions)