★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW GISF Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/GISF-dumps.html


Examcollection offers free demo for GISF exam. "GIAC Information Security Fundamentals", also known as GISF exam, is a GIAC Certification. This set of posts, Passing the GIAC GISF exam, will help you answer those questions. The GISF Questions & Answers covers all the knowledge points of the real exam. 100% real GIAC GISF exams and revised by experts!

Free GISF Demo Online For GIAC Certifitcation:

NEW QUESTION 1

Rick is the project manager of a construction project. He is in a process to procure some construction equipments. There are four vendors available for supplying the equipments. Rick does not want one of them to participate in the bidding as he has some personal grudges against the owner of the vendor. This is the violation of which of the following categories of the Project Management Institute Code of Ethics and Professional Conduct?

  • A. Respect
  • B. Honesty
  • C. Responsibility
  • D. Fairness

Answer: D

NEW QUESTION 2

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Samhain
  • B. SARA
  • C. Snort
  • D. Tripwire

Answer: AC

NEW QUESTION 3

You switch on your mobile Bluetooth device to transfer data to another Bluetooth device. Which of the following Information assurance pillars ensures that the data transfer is being performed with the targeted authorized Bluetooth device and not with any other or unauthorized device?

  • A. Data integrity
  • B. Confidentiality
  • C. Authentication
  • D. Non-repudiation

Answer: C

NEW QUESTION 4

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

  • A. Risk acceptance
  • B. Risk transfer
  • C. Risk avoidance
  • D. Risk mitigation

Answer: B

NEW QUESTION 5

You are the project manager of the HHH Project. The stakeholders for this project are scattered across the world and you need a method to promote interaction. You determine that a Web conferencing software would be the most cost effective solution. The stakeholders can watch a slide show while you walk them through the project details. The stakeholders can hear you, ask questions via a chat software, and post concerns. What is the danger in this presentation?

  • A. 55 percent of all communication is nonverbal and this approach does not provide non- verbal communications.
  • B. The technology is not proven as reliable.
  • C. The stakeholders won't really see you.
  • D. The stakeholders are not required to attend the entire session.

Answer: A

NEW QUESTION 6

You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of _____.

  • A. Bribery
  • B. Irresponsible practice
  • C. Illegal practice
  • D. Conflict of interest

Answer: D

NEW QUESTION 7

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as .

  • A. Multipartite virus
  • B. Boot sector virus
  • C. File virus
  • D. Stealth virus
  • E. Polymorphic virus

Answer: C

NEW QUESTION 8

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?
Each correct answer represents a complete solution. Choose two.

  • A. Attacker can use the Ping Flood DoS attack if WZC is used.
  • B. Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.
  • C. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.
  • D. It will not allow the configuration of encryption and MAC filterin
  • E. Sending information is not secure on wireless network.

Answer: BC

NEW QUESTION 9

Which of the following types of authentications supported by OSPF? Each correct answer represents a complete solution. Choose three.

  • A. MD5 authentication
  • B. Simple password authentication
  • C. Null authentication
  • D. Kerberos v5 authentication

Answer: ABC

NEW QUESTION 10

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

  • A. Smurf DoS attack
  • B. Teardrop attack
  • C. Fraggle DoS attack
  • D. Ping flood attack

Answer: C

NEW QUESTION 11

Under the SMART scheme, the Predictive Failure Analysis Technology is used to determine the failure or crash for which of the following parts of a computer system?

  • A. Operating System
  • B. Hard Disc drive
  • C. Software
  • D. Internet Browser

Answer: B

NEW QUESTION 12

What does Wireless Transport Layer Security (WTLS) provide for wireless devices? Each correct answer represents a complete solution. Choose all that apply.

  • A. Data integrity
  • B. Authentication
  • C. Encryption
  • D. Bandwidth

Answer: ABC

NEW QUESTION 13

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Cookies folder
  • B. Temporary Internet Folder
  • C. Download folder
  • D. History folder

Answer: ABD

NEW QUESTION 14

Which of the following types of attack can guess a hashed password?

  • A. Teardrop attack
  • B. Evasion attack
  • C. Denial of Service attack
  • D. Brute force attack

Answer: D

NEW QUESTION 15

Which of the following tools are used to determine the hop counts of an IP packet? Each correct answer represents a complete solution. Choose two.

  • A. Netstat
  • B. Ping
  • C. TRACERT
  • D. IPCONFIG

Answer: BC

NEW QUESTION 16

Which of the following statements are true about classless routing protocols? Each correct answer represents a complete solution. Choose two.

  • A. They extend the IP addressing scheme.
  • B. The same subnet mask is used everywhere on the network.
  • C. They support VLSM and discontiguous networks.
  • D. IGRP is a classless routing protocol.

Answer: AC

NEW QUESTION 17

You work as a Network Administrator for Net World Inc. The company has a TCP/IP-based network.
You have configured an Internet access router on the network. A user complains that he is unable to access a resource on the Web. You know that a bad NAT table entry is causing the issue. You decide to clear all the entries on the table. Which of the following commands will you use?

  • A. show ip dhcp binding
  • B. ipconfig /flushdns
  • C. ipconfig /all
  • D. clear ip nat translation *

Answer: D

NEW QUESTION 18

You work as the Network Administrator of TechJobs. You implement a security policy, to be in effect at all times, on the client computer in your network. While troubleshooting, assistant administrators often change security settings on the network. You want the security policy to be reapplied after changes have been made. How can you automate this task? (Click the Exhibit button on the toolbar to see the case study.)

  • A. Create a group policy object (GPO) and implement it to the domai
  • B. Configure a security policy on i
  • C. Give Administrators read-only permission on that GPO.
  • D. Create a separate OU for the Administrators to test the security settings.
  • E. Ask the assistant administrators to re-apply the security policy after the changes have been made.
  • F. Schedule the SECEDIT command to run on the client computers.

Answer: D

NEW QUESTION 19

Which of the following processes is described in the statement below?
"It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

  • A. Perform Quantitative Risk Analysis
  • B. Perform Qualitative Risk Analysis
  • C. Monitor and Control Risks
  • D. Identify Risks

Answer: C

NEW QUESTION 20
......

P.S. Dumpscollection.com now are offering 100% pass ensure GISF dumps! All GISF exam questions have been updated with correct answers: https://www.dumpscollection.net/dumps/GISF/ (333 New Questions)