★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW GISF Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/GISF-dumps.html


Master the GISF GIAC Information Security Fundamentals content and be ready for exam day success quickly with this Ucertify GISF test preparation. We guarantee it!We make it a reality and give you real GISF questions in our GIAC GISF braindumps.Latest 100% VALID GIAC GISF Exam Questions Dumps at below page. You can use our GIAC GISF braindumps and pass your exam.

Free GISF Demo Online For GIAC Certifitcation:

NEW QUESTION 1

Which of the following combines the characteristics of a bridge and a router?

  • A. Firewall
  • B. Brouter
  • C. Switch
  • D. Hub
  • E. Repeater

Answer: B

NEW QUESTION 2

Which of the following statements are TRUE regarding asymmetric encryption and symmetric encryption? Each correct answer represents a complete solution. Choose all that apply.

  • A. Data Encryption Standard (DES) is a symmetric encryption key algorithm.
  • B. In symmetric encryption, the secret key is available only to the recipient of the message.
  • C. Symmetric encryption is commonly used when a message sender needs to encrypt a large amount of data.
  • D. Asymmetric encryption uses a public key and a private key pair for data encryption.

Answer: ACD

NEW QUESTION 3

You are concerned about outside attackers penetrating your network via your company Web server.
You wish to place your Web server between two firewalls One firewall between the Web server and the outside world The other between the Web server and your network
What is this called?

  • A. IDS
  • B. SPI firewall
  • C. DMZ
  • D. Application Gateway firewall

Answer: C

NEW QUESTION 4

Which of the following is a valid IP address for class B Networks?

  • A. 172.157.88.3
  • B. 80.33.5.7
  • C. 212.136.45.8
  • D. 225.128.98.7

Answer: A

NEW QUESTION 5

Which of the following is used in asymmetric encryption?

  • A. Public key and user key
  • B. Public key and private key
  • C. SSL
  • D. NTFS

Answer: B

NEW QUESTION 6

Which of the following does an anti-virus program update regularly from its manufacturer's Web site?

  • A. Hotfixes
  • B. Definition
  • C. Service packs
  • D. Permissions

Answer: B

NEW QUESTION 7

You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?

  • A. Utilize protocol analyzers.
  • B. User performance monitors.
  • C. Implement signature based antivirus.
  • D. Implement an anomaly based IDS.

Answer: D

NEW QUESTION 8

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

  • A. Packet filter firewall
  • B. Proxy-based firewall
  • C. Stateful firewall
  • D. Endian firew

Answer: B

NEW QUESTION 9

You have decided to implement an intrusion detection system on your network. You primarily are interested in the IDS being able to recognized known attack techniques. Which type of IDS should you choose?

  • A. Signature Based
  • B. Passive
  • C. Active
  • D. Anomaly Based

Answer: A

NEW QUESTION 10

Which of the following can be used to prevent routing loops in distance vector routing protocols?
Each correct answer represents a complete solution. Choose two.

  • A. Split horizon
  • B. Link-state advertisement
  • C. Spanning Tree Protocol
  • D. Hold-down timers

Answer: AD

NEW QUESTION 11

The new security policy requires you to encrypt all data transmitted from the laptop computers of sales personnel to the distribution centers. How will you implement the security requirements?
(Click the Exhibit button on the toolbar to see the case study.)

  • A. Use 40-bit encryption for Routing and Remote Access Service(RRAS) Serve
  • B. Use PPTP without packet filtering for VPN.
  • C. Use 128-bit encryption for Routing and Remote Access Service(RRAS) Serve
  • D. Use PPTP without packet filtering for VPN.
  • E. Use 128-bit encryption for Routing and Remote Access Service(RRAS) Serve
  • F. Use PPTP with packet filtering for VPN.
  • G. Use 40-bit encryption for the Routing and Remote Access Service(RRAS) Serve
  • H. Use PPTP with packet filtering for VPN.

Answer: C

NEW QUESTION 12

You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?

  • A. Use Incident handling
  • B. Use OODA loop
  • C. Use Information assurance
  • D. Use SMART model.

Answer: D

NEW QUESTION 13

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Slack space
  • B. Unused Sectors
  • C. Dumb space
  • D. Hidden partition

Answer: ABD

NEW QUESTION 14

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

  • A. A DNS Zone
  • B. An Intranet
  • C. A demilitarized zone (DMZ)
  • D. A stub zone

Answer: C

NEW QUESTION 15

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

  • A. Cyber squatting
  • B. Cyber Stalking
  • C. Man-in-the-middle attack
  • D. Spoofing

Answer: D

NEW QUESTION 16

John works as a Network Administrator for Bordeaux Inc. He is planning to design a strategy, so that the employees can connect to a scheduling application. Which of the following strategies is best suited for the company?
(Click the Exhibit button on the toolbar to see the case study.)

  • A. Deploy a VPN server on the VLAN network, and an IIS server on the corporate LAN at the headquarters.
  • B. Deploy a VPN server on the VLAN network, and an IIS server on DMZ.
  • C. Deploy a VPN server on the corporate LAN at the headquarters, and an IIS server on DMZ.
  • D. Deploy a VPN server on DMZ, and an IIS server on the corporate LAN at the headquarters.

Answer: D

NEW QUESTION 17

Mark work as a Network Administrator for Roadways Travel Inc. The conmpany wants to implement a strategy for its external employees so that they can connect to Web based applications. What will Mark do to achieve this?
(Click the Exhibit button on the toolbar to see the case study.)

  • A. He will install a VPN server in the VLAN, Roadways, and an IIS server in the corporate LAN at the headquarters.
  • B. He will install a VPN server in the corporate LAN at the headquarters and an IIS server in the DMZ.
  • C. He will install a VPN server in the DMZ and an IIS server in the corporate LAN at the headquarters.
  • D. He will install a VPN server in the VLAN, Roadways, and an IIS server in the DMZ.

Answer: C

NEW QUESTION 18

You have created a Web site, which will be used for e-commerce. You want to ensure that the transactions are highly secured. For this purpose, you have to create a system to verify the identity of a potential customer. Which of the following security techniques will you use?

  • A. Asymmetric encryption
  • B. Symmetric encryption
  • C. Spoofing
  • D. Digital certificate

Answer: D

NEW QUESTION 19

You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.
  • B. Look at the Web servers logs and normal traffic logging.
  • C. Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.
  • D. Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.

Answer: ABD

NEW QUESTION 20
......

Recommend!! Get the Full GISF dumps in VCE and PDF From Dumps-files.com, Welcome to Download: https://www.dumps-files.com/files/GISF/ (New 333 Q&As Version)