Certleader GISF Questions are updated and all GISF answers are verified by experts. Once you have completely prepared with our GISF exam prep kits you will be ready for the real GISF exam without a problem. We have Renovate GIAC GISF dumps study guide. PASSED GISF First attempt! Here What I Did.
GIAC GISF Free Dumps Questions Online, Read and Test Now.
NEW QUESTION 1
Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?
- A. Eavesdropping
- B. Intrusion
- C. Dialler attack
- D. Denial of service
Answer: A
NEW QUESTION 2
Cryptography is the science of?
- A. Encrypting and decrypting plain text messages.
- B. Decrypting encrypted text messages.
- C. Encrypting plain text messages.
- D. Hacking secure information.
Answer: A
NEW QUESTION 3
Which of the following statements about digital signature is true?
- A. Digital signature is required for an e-mail message to get through a firewall.
- B. Digital signature verifies the identity of the person who applies it to a document.
- C. Digital signature decrypts the contents of documents.
- D. Digital signature compresses the message to which it is applied.
Answer: B
NEW QUESTION 4
Which of the following tools are used to determine the hop counts of an IP packet? Each correct answer represents a complete solution. Choose two.
- A. Netstat
- B. Ping
- C. TRACERT
- D. IPCONFIG
Answer: BC
NEW QUESTION 5
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He enters a single quote in the input field of the login page of the Weare- secure Web site and receives the following error message:
Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'
This error message shows that the We-are-secure Website is vulnerable to _____.
- A. A buffer overflow
- B. An XSS attack
- C. A Denial-of-Service attack
- D. A SQL injection attack
Answer: D
NEW QUESTION 6
You are the Administrator for a corporate network. You are concerned about denial of service attacks. Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?
- A. Shorten the timeout for connection attempts.
- B. Place a honey pot in the DMZ.
- C. Implement a strong password policy.
- D. Implement network based antivirus.
Answer: A
NEW QUESTION 7
Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?
- A. The Configuration Manager
- B. The Supplier Manager
- C. The IT Service Continuity Manager
- D. The Service Catalogue Manager
Answer: B
NEW QUESTION 8
Which of the following books is used to examine integrity and availability?
- A. Brown Book
- B. Red Book
- C. Purple Book
- D. Orange Book
Answer: B
NEW QUESTION 9
Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer?
- A. IPLog
- B. Snort
- C. Timbersee
- D. Swatch
Answer: B
NEW QUESTION 10
Rick works as a Network Administrator for Fimbry Hardware Inc. Based on the case study, which network routing strategy will he implement for the company? (Click the Exhibit button
on the toolbar to see the case study.)
- A. He will implement OSPF on all the router interfaces.
- B. He will implement RIP v1 on all the router interfaces.
- C. He will implement the IGMP on all the router interface.
- D. He will implement RIP v2 on all the router interfaces.
- E. He will implement static routes for the routers.
Answer: E
NEW QUESTION 11
Security is responsible for well-being of information and infrastructures in which the
possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security?
Each correct answer represents a complete solution. Choose all that apply.
- A. Availability
- B. Confidentiality
- C. Confidentiality
- D. Authenticity
Answer: ABCD
NEW QUESTION 12
Which of the following is the primary function of VPNs?
- A. To establish private connections over public networks
- B. To make virtual connections for remote access
- C. To establish a wireless connections to networks
- D. To access networks remotely
Answer: A
NEW QUESTION 13
You discover that someone has been logging onto your network after office hours. After investigating this you find the login belongs to someone who left the company 12 months ago. What would have been the best method to prevent this?
- A. A policy with time of day restrictions.
- B. An IDS system.
- C. A policy with account expiration.
- D. A DMZ firewall.
Answer: C
NEW QUESTION 14
Which of the following are some of the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
- A. Risk identification
- B. Project schedule
- C. Team members list
- D. Risk analysis
Answer: ABC
NEW QUESTION 15
Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?
- A. PING attack
- B. Spoofing
- C. Hacking
- D. SYN attack
Answer: D
NEW QUESTION 16
Which of the following security applications is used to secure a database from unauthorized accesses in a network infrastructure?
- A. Antivirus
- B. Anti-Malware
- C. Anti-Spoofing
- D. Firewall
Answer: D
NEW QUESTION 17
In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?
- A. Bandwidth
- B. Load
- C. Delay
- D. Frequency
Answer: D
NEW QUESTION 18
CORRECT TEXT
Fill in the blank with the appropriate layer name.
The Network layer of the OSI model corresponds to the ______ layer of the TCP/IP model.
Solution:
Internet
Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 19
......
Thanks for reading the newest GISF exam dumps! We recommend you to try the PREMIUM Dumpscollection.com GISF dumps in VCE and PDF here: https://www.dumpscollection.net/dumps/GISF/ (333 Q&As Dumps)