★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW GISF Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/GISF-dumps.html
Passleader GISF Questions are updated and all GISF answers are verified by experts. Once you have completely prepared with our GISF exam prep kits you will be ready for the real GISF exam without a problem. We have Most recent GIAC GISF dumps study guide. PASSED GISF First attempt! Here What I Did.
Free GISF Demo Online For GIAC Certifitcation:
NEW QUESTION 1
Which of the following statements are true about routers?
Each correct answer represents a complete solution. Choose all that apply.
- A. Routers do not limit physical broadcast traffic.
- B. Routers act as protocol translators and bind dissimilar networks.
- C. Routers organize addresses into classes, which are used to determine how to move packets from one network to another.
- D. Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.
Answer: BCD
NEW QUESTION 2
Which of the following is not needed for effective procurement planning?
- A. Activity resource management
- B. Project schedule
- C. Cost baseline
- D. Quality risk analysis
Answer: D
NEW QUESTION 3
Which of the following statements are true about TCP/IP model?
Each correct answer represents a complete solution. Choose all that apply.
- A. It is consists of various protocols present in each layer.
- B. It describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network.
- C. It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.
- D. It is generally described as having five abstraction layers.
Answer: ABC
NEW QUESTION 4
You are developing an online business solution for National Institute of Meteorological and Oceanographic Research (NIMOR). A case study for the organization is given in the exhibit. Based on the case study, you need to implement Internet security so that no user can hack confidential data. According to you, which of the following security options will you use for your solution? Each correct answer represents a complete solution. Choose all that apply. (Click the Exhibit button on the toolbar to see the case study.)
- A. Antivirus and antispyware software
- B. Secure Sockets Layer and digital certificates
- C. Firewall security
- D. Automatic Updates in Windows XP
Answer: AC
NEW QUESTION 5
You are configuring the Terminal service. What Protocols are required with Terminal services? (Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a part of the solution. Choose two.
- A. L2TP
- B. TCP/IP
- C. RDP
- D. CHAP
- E. PPTP
Answer: BC
NEW QUESTION 6
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
- A. The presentation layer
- B. The application layer
- C. The transport layer
- D. The session layer
Answer: C
NEW QUESTION 7
You want to install a server that can be accessed by external users. You also want to ensure that these users cannot access the rest of the network. Where will you place the server?
- A. Intranet
- B. Local Area Network
- C. Internet
- D. Demilitarized Zone
- E. Extranet
- F. Wide Area Network
Answer: D
NEW QUESTION 8
Which of the following tools can be used for stress testing of a Web server? Each correct answer represents a complete solution. Choose two.
- A. Internet bots
- B. Spyware
- C. Scripts
- D. Anti-virus software
Answer: AC
NEW QUESTION 9
Which of the following U.S.C. laws is governs the fraudulent activities associated with computers?
- A. 18 U.S.
- B. 2251
- C. 18 U.S.
- D. 3771
- E. 18 U.S.
- F. 2257
- G. 18 U.S.
- H. 1030
Answer: D
NEW QUESTION 10
Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.
- A. Transposition cipher
- B. Message Authentication Code
- C. Stream cipher
- D. Block cipher
Answer: BCD
NEW QUESTION 11
Which of the following tools can be used to perform tasks such as Windows password cracking Windows enumeration, and VoIP session sniffing?
- A. John the Ripper
- B. Obiwan
- C. Cain
- D. L0phtcrack
Answer: C
NEW QUESTION 12
Which of the following is a pillar of Information Assurance CIA triad?
- A. Integrity
- B. Affiliation
- C. Accessibility
- D. Isolation
Answer: A
NEW QUESTION 13
Security is responsible for well-being of information and infrastructures in which the
possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security?
Each correct answer represents a complete solution. Choose all that apply.
- A. Availability
- B. Confidentiality
- C. Confidentiality
- D. Authenticity
Answer: ABCD
NEW QUESTION 14
Which of the following concepts represent the three fundamental principles of information security?
Each correct answer represents a complete solution. Choose three.
- A. Privacy
- B. Availability
- C. Integrity
- D. Confidentiality
Answer: BCD
NEW QUESTION 15
Which of the following types of firewall functions at the Session layer of OSI model?
- A. Circuit-level firewall
- B. Application-level firewall
- C. Switch-level firewall
- D. Packet filtering firewall
Answer: A
NEW QUESTION 16
Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?
- A. Teardrop attack
- B. SYN flood attack
- C. Ping of Death attack
- D. DDoS attack
Answer: D
NEW QUESTION 17
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site. The We-are-secure login page is vulnerable to a _____.
- A. Social engineering
- B. Smurf DoS
- C. Brute force
- D. Ping flood attack
Answer: A
NEW QUESTION 18
You and your project team want to perform some qualitative analysis on the risks you have identified and documented in Project Web Access for your project. You would like to create a table that captures the likelihood and affect of the risk on the project. What type of a chart or table would you like to create for the project risks?
- A. Risk Breakdown Structure
- B. Risk Probability and Impact Matrix
- C. Risk Review Table
- D. Risk Impact and Affect Matrix
Answer: B
NEW QUESTION 19
Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?
* 1. To account for all IT assets
* 2. To provide precise information support to other ITIL disciplines
* 3. To provide a solid base only for Incident and Problem Management
* 4. To verify configuration records and correct any exceptions
- A. 2 and 4 only
- B. 1, 3, and 4 only
- C. 1, 2, and 4 only
- D. 2, 3, and 4 only
Answer: C
NEW QUESTION 20
......
Recommend!! Get the Full GISF dumps in VCE and PDF From Downloadfreepdf.net, Welcome to Download: https://www.downloadfreepdf.net/GISF-pdf-download.html (New 333 Q&As Version)