Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GISF GIAC Information Security Fundamentals Questions and Answers

Questions 4

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Authentication

B.

Confidentiality

C.

Integrity

D.

Non-repudiation

Buy Now
Questions 5

Which of the following is a valid IP address for class B Networks?

Options:

A.

172.157.88.3

B.

80.33.5.7

C.

212.136.45.8

D.

225.128.98.7

Buy Now
Questions 6

You work as a Network Administrator for ABC Inc. The company has a secure wireless network.

However, in the last few days, an attack has been taking place over and over again. This attack is taking advantage of ICMP directed broadcast. To stop this attack, you need to disable ICMP directed broadcasts. Which of the following attacks is taking place?

Options:

A.

Smurf attack

B.

Sniffer attack

C.

Cryptographic attack

D.

FMS attack

Buy Now
Questions 7

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?

Options:

A.

Configure Network address translation (NAT).

B.

Disable Windows firewall logging.

C.

Configure Internet Protocol Security (IPSec).

D.

Enable Windows firewall logging.

Buy Now
Questions 8

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Options:

A.

Corrective controls

B.

Detective controls

C.

Safeguards

D.

Preventive controls

Buy Now
Questions 9

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system. He wants to sniff the weare- secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

Options:

A.

Hunt

B.

IPChains

C.

Ethercap

D.

Tripwire

Buy Now
Questions 10

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:

A.

Risk acceptance

B.

Risk transfer

C.

Risk avoidance

D.

Risk mitigation

Buy Now
Questions 11

You have an antivirus program for your network. It is dependent upon using lists of known viruses. What is this type of scan called?

Options:

A.

Heuristic

B.

Fixed List

C.

Dictionary

D.

Host Based

Buy Now
Questions 12

You are the security manager of Microliss Inc. Your enterprise uses a wireless network infrastructure with access points ranging 150-350 feet. The employees using the network complain that their passwords and important official information have been traced. You discover the following clues:

The information has proved beneficial to another company.

The other company is located about 340 feet away from your office.

The other company is also using wireless network.

The bandwidth of your network has degraded to a great extent.

Which of the following methods of attack has been used?

Options:

A.

A piggybacking attack has been performed.

B.

The information is traced using Bluebugging.

C.

A DOS attack has been performed.

D.

A worm has exported the information.

Buy Now
Questions 13

Which of the following statements about Encapsulating Security Payload (ESP) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It can also be nested with the Layer Two Tunneling Protocol (L2TP).

B.

It is an IPSec protocol.

C.

It is a text-based communication protocol.

D.

It uses TCP port 22 as the default port and operates at the application layer.

Buy Now
Questions 14

How long are cookies in effect if no expiration date is set?

Options:

A.

Fifteen days

B.

Until the session ends.

C.

Forever

D.

One year

Buy Now
Questions 15

Which of the following tools are used to determine the hop counts of an IP packet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Netstat

B.

Ping

C.

TRACERT

D.

IPCONFIG

Buy Now
Questions 16

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:

A.

IPChains

B.

OpenSSH

C.

Stunnel

D.

IPTables

Buy Now
Questions 17

Fred is the project manager for the TCC Company. His company has an internal policy that states each year they will provide free services to a nonprofit organization. Therefore, the company and its employees are not allowed to charge or receive money or gifts from the nonprofit organization they choose to provide free services. This year, the TCC Company offers to provide project management services to the children's hospital for a marketing campaign to raise money. Due to the TCC Company's project management services, the nonprofit agency exceeded previous years fund raising efforts. To show appreciation the nonprofit organization offered to reimburse the project manager for his travel expenses. Which of the following best describes how the project manager should handle the situation?

Options:

A.

Say thank you and let them pay for the travel, it is the least they can do.

B.

Tell the hospital no thank you and explain it is against company policy to accept payment for services provided to their pro bono customers.

C.

Say nothing as to not hurt the feelings of the children's hospital.

D.

Ask if the hospital could pay for some of the supplies too.

Buy Now
Questions 18

Which of the following logs contains events pertaining to security as defined in the Audit policy?

Options:

A.

DNS server log

B.

Application log

C.

System log

D.

Directory Service log

E.

Security log

F.

File Replication Service log

Buy Now
Questions 19

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Recovery

B.

Contamination

C.

Identification

D.

Eradication

E.

Preparation

Buy Now
Questions 20

Which of the following types of attack can guess a hashed password?

Options:

A.

Teardrop attack

B.

Evasion attack

C.

Denial of Service attack

D.

Brute force attack

Buy Now
Questions 21

Which of the following is used in asymmetric encryption?

Options:

A.

Public key and user key

B.

Public key and private key

C.

SSL

D.

NTFS

Buy Now
Questions 22

You are the project manager for BlueWell Inc. You are reviewing the risk register for your project. The risk register provides much information to you, the project manager and to the project team during the risk response planning. All of the following are included in the risk register except for which item?

Options:

A.

Trends in qualitative risk analysis results

B.

Symptoms and warning signs of risks

C.

List of potential risk responses

D.

Network diagram analysis of critical path activities

Buy Now
Questions 23

You are concerned about outside attackers penetrating your network via your company Web server.

You wish to place your Web server between two firewalls

One firewall between the Web server and the outside world

The other between the Web server and your network

What is this called?

Options:

A.

IDS

B.

SPI firewall

C.

DMZ

D.

Application Gateway firewall

Buy Now
Questions 24

Jane works as a Consumer Support Technician for McRoberts Inc. The company provides troubleshooting support to users. A user named Peter installs Windows Vista on his computer. He connects his computer on the network. He wants to protect his computer from malicious software and prevent hackers from gaining access to his computer through the network. Which of the following actions will Jane assist Peter to perform to accomplish the task?

Options:

A.

Don't stay logged on as an administrator.

B.

Use a firewall.

C.

Keep the computer up-to-date.

D.

Run antivirus software on the computer.

Buy Now
Questions 25

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Options:

A.

S/MIME

B.

Asymmetric

C.

PGP

D.

Symmetric

Buy Now
Questions 26

Which of the following is the maximum variable key length for the Blowfish encryption algorithm?

Options:

A.

448 bit

B.

256 bit

C.

64 bit

D.

16 bit

Buy Now
Questions 27

Web applications play a vital role in deploying different databases with user accessibility on the Internet. Which of the following allows an attacker to get unauthorized access to the database of a Web application by sending (attacking) user-supplied data to an interpreter as part of a command or query?

Options:

A.

Cross Site Scripting

B.

Injection flaw

C.

Cross Site Request Forgery (CSRF)

D.

Malicious File Execution

Buy Now
Questions 28

In packet filtering types of firewalls, which of the following specifies what traffic can and cannot traverse the firewall?

Options:

A.

Internet bot

B.

Access control list

C.

ASDM

D.

RIP

Buy Now
Questions 29

The TCP/IP protocol suite uses ____ to identify which service a certain packet is destined for.

Options:

A.

Subnet masks

B.

IP addresses

C.

MAC addresses

D.

Port numbers

Buy Now
Questions 30

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

Options:

A.

Configuration Status Accounting

B.

Configuration Item Costing

C.

Configuration Identification

D.

Configuration Verification and Auditing

Buy Now
Questions 31

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

Options:

A.

Organizing a solution to remove an incident

B.

Building up an incident response kit

C.

Working with QA to validate security of the enterprise

D.

Setting up the initial position after an incident

Buy Now
Questions 32

Which of the following IDS/IPS detection methods do the URLs use to detect and prevent an attack?

Options:

A.

Encryption-based detection

B.

Policy-based detection

C.

Signature-based detection

D.

Internet bot detection

Buy Now
Questions 33

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

Options:

A.

Cryptography

B.

OODA loop

C.

Risk analysis

D.

Firewall security

Buy Now
Questions 34

Which of the following statements about digital signature is true?

Options:

A.

Digital signature is required for an e-mail message to get through a firewall.

B.

Digital signature verifies the identity of the person who applies it to a document.

C.

Digital signature decrypts the contents of documents.

D.

Digital signature compresses the message to which it is applied.

Buy Now
Questions 35

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

Options:

A.

Quantitative analysis

B.

Qualitative analysis

C.

Estimate activity duration

D.

Risk identification

Buy Now
Questions 36

According to the case study, what protocol should be used to protect a customer's privacy and credit card information?

(Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

L2TP

B.

FTP

C.

HTTP

D.

MS-CHAP

E.

HTTPS

F.

PPTP

Buy Now
Questions 37

Bluetooth uses the _________ specification in the ________ band with FHSS technology.

Options:

A.

IEEE 802.11, 2.4-2.5 GHz

B.

IEEE 802.11, 1.4-2.5 GHz

C.

IEEE 802.15, 1.5-2.0 GHz

D.

IEEE 802.15, 2.4-2.5 GHz

Buy Now
Questions 38

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails.

Which of the following will you use to accomplish this?

Options:

A.

NTFS

B.

PPTP

C.

PGP

D.

IPSec

Buy Now
Questions 39

You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?

Options:

A.

Examining your firewall logs

B.

Examining your DNS Server logs

C.

Examining your domain controller server logs

D.

Examining your antivirus logs

Buy Now
Questions 40

Fill in the blank with the appropriate value. SHA-1 produces a ______-bit message digest.

Options:

Buy Now
Questions 41

You work as a Software Developer for uCertify Inc. You have developed a Data Access Logic (DAL) component that will be part of a distributed application. You are conducting integration testing with other components of the distributed application. Which of the following types of testing methods will you need to perform to identify potential security-related issues? Each correct answer represents a part of the solution. Choose two.

Options:

A.

Unit testing

B.

Stress testing

C.

Load testing

D.

Black box testing

E.

White box testing

Buy Now
Questions 42

Which of the following authentication methods uses MD5 hash encoding while transferring credentials over a network?

Options:

A.

.NET Passport authentication

B.

Advanced Digest authentication

C.

Integrated Windows authentication

D.

Digest authentication

Buy Now
Questions 43

Which of the following refers to the emulation of the identity of a network computer by an attacking computer?

Options:

A.

Spoofing

B.

PING attack

C.

Hacking

D.

SYN attack

Buy Now
Questions 44

Which of the following is most useful against DOS attacks?

Options:

A.

Packet filtering firewall

B.

Honey pot

C.

Network surveys

D.

SPI firewall

Buy Now
Questions 45

You are the project manager of a new project to install new hardware for your organization's computer network. You have never worked with networking software or hardware before so you enroll in a class to learn more about the technology you'll be managing in your project. This is an example of which one of the following?

Options:

A.

Cost of nonconformance to quality

B.

Enhancing your personal professional competence

C.

Team development

D.

A waste for the project as the project manager does not need to know much about the project's application

Buy Now
Questions 46

The Project Risk Management knowledge area focuses on which of the following processes?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk Management Planning

B.

Quantitative Risk Analysis

C.

Potential Risk Monitoring

D.

Risk Monitoring and Control

Buy Now
Questions 47

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk identification

B.

Project schedule

C.

Team members list

D.

Risk analysis

Buy Now
Questions 48

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

Options:

A.

Containment

B.

Preparation

C.

Recovery

D.

Identification

Buy Now
Questions 49

Which of the following statements are TRUE regarding asymmetric encryption and symmetric encryption? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Data Encryption Standard (DES) is a symmetric encryption key algorithm.

B.

In symmetric encryption, the secret key is available only to the recipient of the message.

C.

Symmetric encryption is commonly used when a message sender needs to encrypt a large amount of data.

D.

Asymmetric encryption uses a public key and a private key pair for data encryption.

Buy Now
Questions 50

Which of the following factors determine the strength of the encryption?

Options:

A.

Character-set encoding

B.

Length of the key

C.

Operating system

D.

Ease of use

Buy Now
Questions 51

You are the project manager of a new project in your organization. You and the project team have identified the project risks, completed risk analysis, and are planning the most appropriate risk responses. Which of the following tools is most effective to choose the most appropriate risk response?

Options:

A.

Project network diagrams

B.

Delphi Technique

C.

Decision tree analysis

D.

Cause-and-effect diagrams

Buy Now
Questions 52

Which of the following provide data confidentiality services by encrypting the data sent between wireless systems?

Each correct answer represents a complete solution. Choose two.

Options:

A.

MS-CHAP v2

B.

WEP

C.

PAP

D.

WPA

Buy Now
Questions 53

You want to ensure that everyone who sends you an email should encrypt it. However you do not wish to exchange individual keys with all people who send you emails. In order to accomplish this goal which of the following should you choose?

Options:

A.

DES

B.

AES

C.

Symmetric Encryption

D.

Public Key encryption

Buy Now
Questions 54

Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Address Resolution Protocol (ARP)

B.

Network Link Protocol (NWLink)

C.

User Datagram Protocol (UDP)

D.

Internet Control Message Protocol (ICMP)

Buy Now
Questions 55

Which of the following monitors program activities and modifies malicious activities on a system?

Options:

A.

Back door

B.

HIDS

C.

RADIUS

D.

NIDS

Buy Now
Questions 56

Which of the following types of authentications supported by OSPF?

Each correct answer represents a complete solution. Choose three.

Options:

A.

MD5 authentication

B.

Simple password authentication

C.

Null authentication

D.

Kerberos v5 authentication

Buy Now
Questions 57

Which of the following are the examples of administrative controls?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Data Backup

B.

Security policy

C.

Security awareness training

D.

Auditing

Buy Now
Questions 58

Andrew works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains five Windows 2008 member servers and 120 Windows XP Professional client computers. Andrew is concerned about the member servers that are not meeting the security requirements as mentioned in the security policy of the company. Andrew wants to compare the current security settings of the member servers with the security template that is configured according to the security policy of the company. Which of the following tools will Andrew use to accomplish this?

Options:

A.

Security Configuration and Analysis Tool

B.

Active Directory Migration Tool (ADMT)

C.

Task Manager

D.

Group Policy Management Console (GPMC)

Buy Now
Questions 59

You work as a Software Developer for Mansoft Inc. You, together with a team, develop a distributed application that processes orders from multiple types of clients. The application uses SQL Server to store data for all orders. The application does not implement any custom performance counters. After the application is deployed to production, it must be monitored for performance spikes. What will you do to monitor performance spikes in the application in a deployment environment?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Use SQL Profiler

B.

Use CLR Profiler

C.

Use Windows System Monitor

D.

Use Microsoft Operations Manager

Buy Now
Questions 60

You work as a Network Administrator for Infosec Inc. You find that not only have security applications running on the server, including software firewalls, anti-virus programs, and anti-spyware programs been disabled, but anti-virus and anti-spyware definitions have also been deleted. You suspect that this situation has arisen due to malware infection. Which of the following types of malware is the most likely cause of the issue?

Options:

A.

Whack-A-Mole

B.

FireKiller 2000

C.

Beast

D.

SubSeven

Buy Now
Questions 61

You work as the Network Administrator of TechJobs. You implement a security policy, to be in effect at all times, on the client computer in your network. While troubleshooting, assistant administrators often change security settings on the network. You want the security policy to be reapplied after changes have been made. How can you automate this task? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Create a group policy object (GPO) and implement it to the domain. Configure a security policy on it. Give Administrators read-only permission on that GPO.

B.

Create a separate OU for the Administrators to test the security settings.

C.

Ask the assistant administrators to re-apply the security policy after the changes have been made.

D.

Schedule the SECEDIT command to run on the client computers.

Buy Now
Questions 62

Which of the following policies define how Identification and Authorization occur and determine access control, audits, and network connectivity?

Options:

A.

Information policies

B.

Usage policies

C.

Security policies

D.

Administrative policies

E.

Disaster Recovery Plans

F.

Design Requirements

Buy Now
Questions 63

What are packet sniffers?

Options:

A.

Packet sniffers encrypt the packages as they cross the network.

B.

Packet sniffers test package security.

C.

Packet sniffers test the packages to verify data integrity.

D.

Packet sniffers capture the packages as they cross the network.

Buy Now
Questions 64

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network.

John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

Options:

A.

Operational audit

B.

Non-operational audit

C.

Independent audit

D.

Dependent audit

Buy Now
Questions 65

Which of the following protocols implements VPN using IPSec?

Options:

A.

SLIP

B.

PPTP

C.

PPP

D.

L2TP

Buy Now
Questions 66

Which of the following are the levels of public or commercial data classification system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Sensitive

B.

Unclassified

C.

Confidential

D.

Public

E.

Secret

F.

Private

Buy Now
Questions 67

The executive team wants you to track labor costs for your project as well as progress on task completion and the resulting dates. What information must you update for tasks to provide this information?

Options:

A.

Start, Work, and Remaining Work

B.

Actual Start and Percent Complete

C.

Actual Start, Actual Work, and Remaining Work

D.

Actual Start, Percent Complete, and Remaining Duration

Buy Now
Questions 68

You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company's network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?

Options:

A.

Antivirus software is running on the computer.

B.

You have provided an improper product key.

C.

The computer is running a driver that is incompatible with Vista.

D.

The computer has a hardware device that is incompatible with Vista.

Buy Now
Questions 69

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Web ripping

B.

Email spoofing

C.

Steganography

D.

Social engineering

Buy Now
Questions 70

You discover that someone has been logging onto your network after office hours. After investigating this you find the login belongs to someone who left the company 12 months ago. What would have been the best method to prevent this?

Options:

A.

A policy with time of day restrictions.

B.

An IDS system.

C.

A policy with account expiration.

D.

A DMZ firewall.

Buy Now
Questions 71

Which of the following statements are true about TCP/IP model?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It is consists of various protocols present in each layer.

B.

It describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network.

C.

It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.

D.

It is generally described as having five abstraction layers.

Buy Now
Questions 72

You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?

Options:

A.

Utilize protocol analyzers.

B.

User performance monitors.

C.

Implement signature based antivirus.

D.

Implement an anomaly based IDS.

Buy Now
Questions 73

The IT Director of the company is very concerned about the security of the network. Which audit policy should he implement to detect possible intrusions into the network? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

The success and failure auditing for policy change.

B.

The success and failure auditing for process tracking.

C.

The success and failure auditing for logon events.

D.

The success and failure auditing for privilege use.

Buy Now
Questions 74

You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of ____.

Options:

A.

Bribery

B.

Irresponsible practice

C.

Illegal practice

D.

Conflict of interest

Buy Now
Questions 75

Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Maintaining cordial relationship with project sponsors

B.

Reporting your project management appearance

C.

Staying up-to-date with project management practices

D.

Staying up-to-date with latest industry trends and new technology

Buy Now
Questions 76

You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

Options:

A.

FTP

B.

Gopher

C.

Firewall

D.

HTTP

Buy Now
Questions 77

Which of the following protocols is used to prevent switching loops in networks with redundant switched paths?

Options:

A.

Cisco Discovery Protocol (CDP)

B.

Spanning Tree Protocol (STP)

C.

File Transfer Protocol (FTP)

D.

VLAN Trunking Protocol (VTP)

Buy Now
Questions 78

Which of the following are the types of Intrusion detection system?

Options:

A.

Server-based intrusion detection system (SIDS)

B.

Client based intrusion detection system (CIDS)

C.

Host-based intrusion detection system (HIDS)

D.

Network intrusion detection system (NIDS)

Buy Now
Questions 79

You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?

Options:

A.

Network Based

B.

Dictionary

C.

Heuristic

D.

Host based

Buy Now
Questions 80

What is VeriSign?

Options:

A.

It is a data warehouse.

B.

It is an e-commerce portal.

C.

It is a search engine.

D.

It is a payment gateway.

Buy Now
Questions 81

You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

Options:

A.

Vertical Privilege Escalation

B.

Session Hijacking

C.

Account hijacking

D.

Horizontal Privilege Escalation

Buy Now
Questions 82

Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?

Options:

A.

Firewall

B.

Automatic Updating

C.

Other Security Settings

D.

Malware Protection

Buy Now
Questions 83

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

Options:

A.

Data encrypted with the secret key can only be decrypted by another secret key.

B.

The secret key can encrypt a message, and anyone with the public key can decrypt it.

C.

Data encrypted by the public key can only be decrypted by the secret key.

D.

The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

Buy Now
Questions 84

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

Options:

A.

Technical representative

B.

Legal representative

C.

Lead investigator

D.

Information security representative

Buy Now
Questions 85

Which of the following devices or hardware parts employs SMART model system as a monitoring system?

Options:

A.

Modem

B.

RAM

C.

Hard disk

D.

IDS

Buy Now
Questions 86

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Packet filtering

B.

Firewall

C.

Intrusion detection system (IDS)

D.

Demilitarized zone (DMZ)

Buy Now
Questions 87

Which of the following are the benefits of information classification for an organization?

Options:

A.

It helps identify which information is the most sensitive or vital to an organization.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes

C.

It helps identify which protections apply to which information.

D.

It helps reduce the Total Cost of Ownership (TCO).

Buy Now
Questions 88

Which of the following statements about a brute force attack is true?

Options:

A.

It is a program that allows access to a computer without using security checks.

B.

It is an attack in which someone accesses your e-mail server and sends misleading information to others.

C.

It is a virus that attacks the hard drive of a computer.

D.

It is a type of spoofing attack.

E.

It is an attempt by an attacker to guess passwords until he succeeds.

Buy Now
Questions 89

Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

Options:

A.

Teardrop attack

B.

SYN flood attack

C.

Ping of Death attack

D.

DDoS attack

Buy Now
Questions 90

You are the project manager for a software technology company. You and the project team have identified that the executive staff is not fully committed to the project. Which of the following best describes the risk?

Options:

A.

Residual risks

B.

Trend analysis

C.

Schedule control

D.

Organizational risks

Buy Now
Questions 91

You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?

Options:

A.

Kerberos

B.

HTTPS

C.

RSA

D.

IPSEC

Buy Now
Questions 92

You work as a Software Developer for uCertify Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:

A.

Cryptographer

B.

Cryptographic toolkit

C.

Cryptosystem

D.

Cryptanalyst

Buy Now
Questions 93

You have purchased a wireless router for your home network. What will you do first to enhance the security?

Options:

A.

Change the default password and administrator's username on the router

B.

Disable the network interface card on the computer

C.

Configure DMZ on the router

D.

Assign a static IP address to the computers

Buy Now
Questions 94

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?

Options:

A.

Apply firewalls at appropriate spots.

B.

Download and install new firmware patch for the router.

C.

Disable the SSID broadcast feature of the router.

D.

Apply a standard ACL on the router.

Buy Now
Questions 95

You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?

Options:

A.

Risk Management Plan

B.

Communications Management Plan

C.

Stakeholder management strategy

D.

Resource Management Plan

Buy Now
Questions 96

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

Options:

A.

Antivirus log

B.

System log

C.

IDS log

D.

Firewall log

Buy Now
Questions 97

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

Options:

A.

Antivirus

B.

Backup

C.

Symmetric encryption

D.

Firewall

Buy Now
Questions 98

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WPA with 802.1X authentication

B.

WPA with Pre Shared Key

C.

WPA

D.

WEP

Buy Now
Questions 99

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

Options:

A.

Sending deceptive e-mails

B.

Sending notifications

C.

Shunning

D.

Logging

E.

Spoofing

F.

Network Configuration Changes

Buy Now
Exam Code: GISF
Exam Name: GIAC Information Security Fundamentals
Last Update: Apr 30, 2026
Questions: 333

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now GISF testing engine

PDF (Q&A)

$43.57  $124.49
buy now GISF pdf