Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

GISF Sample Questions Answers

Questions 4

You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

Options:

A.

FTP

B.

Gopher

C.

Firewall

D.

HTTP

Buy Now
Questions 5

Which of the following are the types of Intrusion detection system?

Options:

A.

Server-based intrusion detection system (SIDS)

B.

Client based intrusion detection system (CIDS)

C.

Host-based intrusion detection system (HIDS)

D.

Network intrusion detection system (NIDS)

Buy Now
Questions 6

What is VeriSign?

Options:

A.

It is a data warehouse.

B.

It is an e-commerce portal.

C.

It is a search engine.

D.

It is a payment gateway.

Buy Now
Questions 7

Rick works as a Network Administrator for Fimbry Hardware Inc. Based on the case study, which network routing strategy will he implement for the company? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

He will implement OSPF on all the router interfaces.

B.

He will implement RIP v1 on all the router interfaces.

C.

He will implement the IGMP on all the router interface.

D.

He will implement RIP v2 on all the router interfaces.

E.

He will implement static routes for the routers.

Buy Now
Questions 8

Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

Options:

A.

Teardrop attack

B.

SYN flood attack

C.

Ping of Death attack

D.

DDoS attack

Buy Now
Questions 9

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?

Options:

A.

Apply firewalls at appropriate spots.

B.

Download and install new firmware patch for the router.

C.

Disable the SSID broadcast feature of the router.

D.

Apply a standard ACL on the router.

Buy Now
Questions 10

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

Options:

A.

Antivirus log

B.

System log

C.

IDS log

D.

Firewall log

Buy Now
Questions 11

You are the project manager for a software technology company. You and the project team have identified that the executive staff is not fully committed to the project. Which of the following best describes the risk?

Options:

A.

Residual risks

B.

Trend analysis

C.

Schedule control

D.

Organizational risks

Buy Now
Questions 12

The method used to encrypt messages by transposing or scrambling the characters in a certain manner is known as ______.

Options:

A.

Quantum cipher

B.

Transposition cipher

C.

Hybrid systems

D.

Mathematical cipher

E.

Substitution cipher

F.

Steganography

Buy Now
Questions 13

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Packet filtering

B.

Firewall

C.

Intrusion detection system (IDS)

D.

Demilitarized zone (DMZ)

Buy Now
Questions 14

You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?

Options:

A.

Kerberos

B.

HTTPS

C.

RSA

D.

IPSEC

Buy Now
Questions 15

You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?

Options:

A.

Risk Management Plan

B.

Communications Management Plan

C.

Stakeholder management strategy

D.

Resource Management Plan

Buy Now
Questions 16

Which of the following devices or hardware parts employs SMART model system as a monitoring system?

Options:

A.

Modem

B.

RAM

C.

Hard disk

D.

IDS

Buy Now
Questions 17

You work as a Software Developer for uCertify Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:

A.

Cryptographer

B.

Cryptographic toolkit

C.

Cryptosystem

D.

Cryptanalyst

Buy Now
Questions 18

You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?

Options:

A.

Network Based

B.

Dictionary

C.

Heuristic

D.

Host based

Buy Now
Questions 19

Which of the following is used in asymmetric encryption?

Options:

A.

Public key and user key

B.

Public key and private key

C.

SSL

D.

NTFS

Buy Now
Questions 20

Which of the following logs contains events pertaining to security as defined in the Audit policy?

Options:

A.

DNS server log

B.

Application log

C.

System log

D.

Directory Service log

E.

Security log

F.

File Replication Service log

Buy Now
Questions 21

You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of ____.

Options:

A.

Bribery

B.

Irresponsible practice

C.

Illegal practice

D.

Conflict of interest

Buy Now
Questions 22

The IT Director of the company is very concerned about the security of the network. Which audit policy should he implement to detect possible intrusions into the network? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

The success and failure auditing for policy change.

B.

The success and failure auditing for process tracking.

C.

The success and failure auditing for logon events.

D.

The success and failure auditing for privilege use.

Buy Now
Questions 23

You have purchased a wireless router for your home network. What will you do first to enhance the security?

Options:

A.

Change the default password and administrator's username on the router

B.

Disable the network interface card on the computer

C.

Configure DMZ on the router

D.

Assign a static IP address to the computers

Buy Now
Questions 24

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

Options:

A.

Data encrypted with the secret key can only be decrypted by another secret key.

B.

The secret key can encrypt a message, and anyone with the public key can decrypt it.

C.

Data encrypted by the public key can only be decrypted by the secret key.

D.

The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

Buy Now
Questions 25

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

Options:

A.

Antivirus

B.

Backup

C.

Symmetric encryption

D.

Firewall

Buy Now
Questions 26

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Recovery

B.

Contamination

C.

Identification

D.

Eradication

E.

Preparation

Buy Now
Questions 27

You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

Options:

A.

Vertical Privilege Escalation

B.

Session Hijacking

C.

Account hijacking

D.

Horizontal Privilege Escalation

Buy Now
Questions 28

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WPA with 802.1X authentication

B.

WPA with Pre Shared Key

C.

WPA

D.

WEP

Buy Now
Questions 29

The security of a computer against the unauthorized usage largely depends upon the efficiency of the applied access control method. Which of the following statements are true about a computer access control method?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It can be based upon fingerprint or eye recognition.

B.

It can be time-synchronous.

C.

It provides security against the virus attacks.

D.

It provides security against Eavesdropping.

E.

It checks the authenticity of a person.

F.

It is used to encrypt a message before transmitting it on a network.

Buy Now
Questions 30

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

Options:

A.

Install a DMZ firewall

B.

Enable verbose logging on the firewall

C.

Install a host-based IDS

D.

Install a network-based IDS

Buy Now
Questions 31

Which of the following protocols are used by Network Attached Storage (NAS)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Apple Filing Protocol (AFP)

B.

Server Message Block (SMB)

C.

Network File System (NFS)

D.

Distributed file system (Dfs)

Buy Now
Questions 32

You work as a Network Administrator for Net World Inc. The company has a TCP/IP-based network.

You have configured an Internet access router on the network. A user complains that he is unable to access a resource on the Web. You know that a bad NAT table entry is causing the issue. You decide to clear all the entries on the table. Which of the following commands will you use?

Options:

A.

show ip dhcp binding

B.

ipconfig /flushdns

C.

ipconfig /all

D.

clear ip nat translation *

Buy Now
Questions 33

You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?

Options:

A.

Use Incident handling

B.

Use OODA loop

C.

Use Information assurance

D.

Use SMART model.

Buy Now
Questions 34

Which of the following statements about testing are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A stub is a program that simulates a calling unit, and a driver is a program that simulates a called unit.

B.

In unit testing, each independent unit of an application is tested separately.

C.

In integration testing, a developer combines two units that have already been tested into a component.

D.

The bottom-up approach to integration testing helps minimize the need for stubs.

Buy Now
Questions 35

How long are cookies in effect if no expiration date is set?

Options:

A.

Fifteen days

B.

Until the session ends.

C.

Forever

D.

One year

Buy Now
Questions 36

Which of the following is NOT a phase of the OODA Loop strategy?

Options:

A.

Observe

B.

Define

C.

Orient

D.

Act

Buy Now
Questions 37

Which of the following is the best approach to conflict resolution?

Options:

A.

Hard work and understanding

B.

Mutual respect and cooperation

C.

Flexibility

D.

Sincerity and hard work

Buy Now
Questions 38

You and your project team want to perform some qualitative analysis on the risks you have identified and documented in Project Web Access for your project. You would like to create a table that captures the likelihood and affect of the risk on the project. What type of a chart or table would you like to create for the project risks?

Options:

A.

Risk Breakdown Structure

B.

Risk Probability and Impact Matrix

C.

Risk Review Table

D.

Risk Impact and Affect Matrix

Buy Now
Questions 39

Which of the following types of firewalls forms a session flow table?

Options:

A.

Proxy server firewall

B.

Packet filtering firewall

C.

Stateless packet filtering firewall

D.

Stateful packet filtering firewall

Buy Now
Questions 40

Which of the following authentication methods uses MD5 hash encoding while transferring credentials over a network?

Options:

A.

.NET Passport authentication

B.

Advanced Digest authentication

C.

Integrated Windows authentication

D.

Digest authentication

Buy Now
Questions 41

You work as the Network Administrator of TechJobs. You implement a security policy, to be in effect at all times, on the client computer in your network. While troubleshooting, assistant administrators often change security settings on the network. You want the security policy to be reapplied after changes have been made. How can you automate this task? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Create a group policy object (GPO) and implement it to the domain. Configure a security policy on it. Give Administrators read-only permission on that GPO.

B.

Create a separate OU for the Administrators to test the security settings.

C.

Ask the assistant administrators to re-apply the security policy after the changes have been made.

D.

Schedule the SECEDIT command to run on the client computers.

Buy Now
Questions 42

You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?

Options:

A.

Antivirus software

B.

Gateway

C.

Firewall

D.

Bridge

Buy Now
Questions 43

Which of the following statements about Public Key Infrastructure (PKI) is true?

Options:

A.

It uses symmetric key pairs.

B.

It uses public key encryption.

C.

It is a digital representation of information that identifies users.

D.

It provides security using data encryption and digital signature.

Buy Now
Questions 44

Which of the following prevents malicious programs from attacking a system?

Options:

A.

Smart cards

B.

Anti-virus program

C.

Firewall

D.

Biometric devices

Buy Now
Questions 45

Which of the following refers to the process of verifying the identity of a person, network host, or system process?

Options:

A.

Hacking

B.

Authentication

C.

Packet filtering

D.

Auditing

Buy Now
Questions 46

Which of the following U.S.C. laws is governs the fraudulent activities associated with computers?

Options:

A.

18 U.S.C. 2251

B.

18 U.S.C. 3771

C.

18 U.S.C. 2257

D.

18 U.S.C. 1030

Buy Now
Questions 47

You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?

Options:

A.

Examining your firewall logs

B.

Examining your DNS Server logs

C.

Examining your domain controller server logs

D.

Examining your antivirus logs

Buy Now
Questions 48

Tom and Gary are in a debate over which software should be purchased as part of their project. Gary tells Tom that because he's the senior software developer and has been with the company for 12 years, he'll be making the decision on the software. What type of conflict resolution has happened in this instance?

Options:

A.

Avoiding

B.

Forcing

C.

Compromising

D.

Smoothing

Buy Now
Questions 49

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Options:

A.

PsList

B.

Fpipe

C.

Cain

D.

PsExec

Buy Now
Questions 50

Which of the following refers to the emulation of the identity of a network computer by an attacking computer?

Options:

A.

Spoofing

B.

PING attack

C.

Hacking

D.

SYN attack

Buy Now
Questions 51

Which term best describes an e-mail that contains incorrect and misleading information or warnings about viruses?

Options:

A.

Blowfish

B.

Spam

C.

Virus

D.

Trojan horse

E.

Hoax

F.

Rlogin

Buy Now
Questions 52

Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

Options:

A.

Snort

B.

Wireshark

C.

NetWitness

D.

Netresident

Buy Now
Questions 53

Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?

Options:

A.

ESP

B.

IKE

C.

ISAKMP

D.

AH

Buy Now
Questions 54

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Packet filtering firewall

B.

Application-level firewall

C.

Stateful inspection firewall

D.

Circuit-level firewall

Buy Now
Questions 55

You work as a Network Administrator for Tech Perfect Inc. The company has recruited a large number of fresh employees. You have been asked to give them a presentation on data protection and confidentiality to ensure a secure wireless communication between the employees. What types of information require confidentiality? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Information that is public

B.

Information that reveals technical data

C.

Information that may reveal systems relationships

D.

Information that may reveal organizational relationships

Buy Now
Questions 56

Which of the following is an examination of the controls within an Information technology (IT) infrastructure?

Options:

A.

Risk analysis

B.

ITIL

C.

ADP audit

D.

SMART

Buy Now
Questions 57

Which of the following statements about Public Key Infrastructure (PKI) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a digital representation of information that identifies users.

B.

It uses asymmetric key pairs.

C.

It provides security using data encryption and digital signature.

D.

It uses symmetric key pairs.

Buy Now
Questions 58

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?

1. To account for all IT assets

2. To provide precise information support to other ITIL disciplines

3. To provide a solid base only for Incident and Problem Management

4. To verify configuration records and correct any exceptions

Options:

A.

2 and 4 only

B.

1, 3, and 4 only

C.

1, 2, and 4 only

D.

2, 3, and 4 only

Buy Now
Questions 59

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

Options:

A.

The presentation layer

B.

The application layer

C.

The transport layer

D.

The session layer

Buy Now
Questions 60

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

Options:

A.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

B.

HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"

C.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

D.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

Buy Now
Questions 61

Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?

Options:

A.

Proxy server

B.

Cookies

C.

Security

D.

Certificate

Buy Now
Questions 62

Bluetooth uses the _________ specification in the ________ band with FHSS technology.

Options:

A.

IEEE 802.11, 2.4-2.5 GHz

B.

IEEE 802.11, 1.4-2.5 GHz

C.

IEEE 802.15, 1.5-2.0 GHz

D.

IEEE 802.15, 2.4-2.5 GHz

Buy Now
Questions 63

The Information assurance pillars provide the surety of data availability to the users of an Information system. Which of the following network infrastructure techniques accomplishes the objective of an efficient data availability management on a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SAN

B.

EFS

C.

NAS

D.

RAID

Buy Now
Questions 64

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Transposition cipher

B.

Message Authentication Code

C.

Stream cipher

D.

Block cipher

Buy Now
Questions 65

You want to install a server that can be accessed by external users. You also want to ensure that these users cannot access the rest of the network. Where will you place the server?

Options:

A.

Intranet

B.

Local Area Network

C.

Internet

D.

Demilitarized Zone

E.

Extranet

F.

Wide Area Network

Buy Now
Questions 66

Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Maintaining cordial relationship with project sponsors

B.

Reporting your project management appearance

C.

Staying up-to-date with project management practices

D.

Staying up-to-date with latest industry trends and new technology

Buy Now
Questions 67

Fred is the project manager for the TCC Company. His company has an internal policy that states each year they will provide free services to a nonprofit organization. Therefore, the company and its employees are not allowed to charge or receive money or gifts from the nonprofit organization they choose to provide free services. This year, the TCC Company offers to provide project management services to the children's hospital for a marketing campaign to raise money. Due to the TCC Company's project management services, the nonprofit agency exceeded previous years fund raising efforts. To show appreciation the nonprofit organization offered to reimburse the project manager for his travel expenses. Which of the following best describes how the project manager should handle the situation?

Options:

A.

Say thank you and let them pay for the travel, it is the least they can do.

B.

Tell the hospital no thank you and explain it is against company policy to accept payment for services provided to their pro bono customers.

C.

Say nothing as to not hurt the feelings of the children's hospital.

D.

Ask if the hospital could pay for some of the supplies too.

Buy Now
Questions 68

Which of the following statements about a brute force attack is true?

Options:

A.

It is a program that allows access to a computer without using security checks.

B.

It is an attack in which someone accesses your e-mail server and sends misleading information to others.

C.

It is a virus that attacks the hard drive of a computer.

D.

It is a type of spoofing attack.

E.

It is an attempt by an attacker to guess passwords until he succeeds.

Buy Now
Questions 69

Which of the following protocols is used to prevent switching loops in networks with redundant switched paths?

Options:

A.

Cisco Discovery Protocol (CDP)

B.

Spanning Tree Protocol (STP)

C.

File Transfer Protocol (FTP)

D.

VLAN Trunking Protocol (VTP)

Buy Now
Questions 70

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

Options:

A.

Technical representative

B.

Legal representative

C.

Lead investigator

D.

Information security representative

Buy Now
Questions 71

You are the project manager for BlueWell Inc. You are reviewing the risk register for your project. The risk register provides much information to you, the project manager and to the project team during the risk response planning. All of the following are included in the risk register except for which item?

Options:

A.

Trends in qualitative risk analysis results

B.

Symptoms and warning signs of risks

C.

List of potential risk responses

D.

Network diagram analysis of critical path activities

Buy Now
Questions 72

Which of the following types of attack can guess a hashed password?

Options:

A.

Teardrop attack

B.

Evasion attack

C.

Denial of Service attack

D.

Brute force attack

Buy Now
Questions 73

Which two security components should you implement on the sales personnel portable computers to increase security?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose two.

Options:

A.

Remote access policy

B.

L2TP over IPSec

C.

PPTP

D.

Remote Authentication Dial-In User Service (RADIUS)

E.

Encrypting File System (EFS)

Buy Now
Questions 74

Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Privacy

B.

Availability

C.

Integrity

D.

Confidentiality

Buy Now
Questions 75

What does Wireless Transport Layer Security (WTLS) provide for wireless devices?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Data integrity

B.

Authentication

C.

Encryption

D.

Bandwidth

Buy Now
Questions 76

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

Options:

A.

Quantitative analysis

B.

Qualitative analysis

C.

Estimate activity duration

D.

Risk identification

Buy Now
Questions 77

Availability Management allows organizations to sustain the IT service availability to support the business at a justifiable cost. Which of the following elements of Availability Management is used to perform at an agreed level over a period of time?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Maintainability

B.

Resilience

C.

Error control

D.

Recoverability

E.

Reliability

F.

Security

G.

Serviceability

Buy Now
Questions 78

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want to the information security policies.

Which of the following are its significant steps?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Awareness and Training Material Effectiveness

B.

Awareness and Training Material Development

C.

Awareness and Training Material Implementation

D.

Awareness and Training Program Design

Buy Now
Questions 79

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

Options:

A.

Containment

B.

Identification

C.

Preparation

D.

Eradication

Buy Now
Questions 80

Which of the following are the differences between routed protocols and routing protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

A routing protocol is configured on an interface and decides the method of packet delivery.

B.

A routing protocol decides the path for a packet through the network.

C.

A routed protocol is configured on an interface and decides how a packet will be delivered.

D.

A routed protocol works on the transport layer of the OSI model.

Buy Now
Questions 81

You work as a Network Administrator for ABC Inc. The company has a secure wireless network.

However, in the last few days, an attack has been taking place over and over again. This attack is taking advantage of ICMP directed broadcast. To stop this attack, you need to disable ICMP directed broadcasts. Which of the following attacks is taking place?

Options:

A.

Smurf attack

B.

Sniffer attack

C.

Cryptographic attack

D.

FMS attack

Buy Now
Questions 82

Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Forward a copy of the spam to the ISP to make the ISP conscious of the spam.

B.

Send an email to the domain administrator responsible for the initiating IP address.

C.

Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.

D.

Close existing email account and open new email account.

Buy Now
Questions 83

You are the project manager of the HHH Project. The stakeholders for this project are scattered across the world and you need a method to promote interaction. You determine that a Web conferencing software would be the most cost effective solution. The stakeholders can watch a slide show while you walk them through the project details. The stakeholders can hear you, ask questions via a chat software, and post concerns. What is the danger in this presentation?

Options:

A.

55 percent of all communication is nonverbal and this approach does not provide non-verbal communications.

B.

The technology is not proven as reliable.

C.

The stakeholders won't really see you.

D.

The stakeholders are not required to attend the entire session.

Buy Now
Questions 84

You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant. Which algorithm are they most likely using for hashing?

Options:

A.

PKI

B.

MD5

C.

SHA

D.

Kerberos

Buy Now
Questions 85

Which of the following is an organization that defines standards for anti-virus software?

Options:

A.

ICSA

B.

IETF

C.

IIS

D.

IEEE

Buy Now
Questions 86

According to the case study, what protocol should be used to protect a customer's privacy and credit card information?

(Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

L2TP

B.

FTP

C.

HTTP

D.

MS-CHAP

E.

HTTPS

F.

PPTP

Buy Now
Questions 87

Which of the following processes is described in the statement below?

"It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

Options:

A.

Perform Quantitative Risk Analysis

B.

Perform Qualitative Risk Analysis

C.

Monitor and Control Risks

D.

Identify Risks

Buy Now
Questions 88

Which of the following is prepared by the business and serves as a starting point for producing the IT Service Continuity Strategy?

Options:

A.

Disaster Invocation Guideline

B.

Business Continuity Strategy

C.

Index of Disaster-Relevant Information

D.

Availability/ ITSCM/ Security Testing Schedule

Buy Now
Questions 89

You are a Product manager of Marioxiss Inc. Your company management is having a conflict with another company Texasoftg Inc. over an issue of security policies. Your legal advisor has prepared a document that includes the negotiation of views for both the companies. This solution is supposed to be the key for conflict resolution. Which of the following are the forms of conflict resolution that have been employed by the legal advisor?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Orientation

B.

Mediation

C.

Negotiation

D.

Arbitration

Buy Now
Questions 90

Which of the following books is used to examine integrity and availability?

Options:

A.

Brown Book

B.

Red Book

C.

Purple Book

D.

Orange Book

Buy Now
Questions 91

You are a Consumer Support Technician. You are helping a user troubleshoot computer-related issues. While troubleshooting the user's computer, you find a malicious program similar to a virus or worm. The program negatively affects the privacy and security of the computer and is capable of damaging the computer. Which of the following alert levels of Windows Defender is set for this program?

Options:

A.

Low

B.

High

C.

Severe

D.

Medium

Buy Now
Questions 92

Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?

Options:

A.

American Bankers Association

B.

Central Security Service (CSS)

C.

National Institute of Standards and Technology (NIST)

D.

International Telecommunications Union

E.

Request for Comments (RFC)

F.

National Security Agency (NSA)

Buy Now
Questions 93

You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

Options:

A.

By examining your firewall logs.

B.

By examining your domain controller server logs.

C.

By setting up a DMZ.

D.

You cannot, you need an IDS.

Buy Now
Questions 94

Which of the following tools are used to determine the hop counts of an IP packet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Netstat

B.

Ping

C.

TRACERT

D.

IPCONFIG

Buy Now
Questions 95

Which of the following provides a credential that can be used by all Kerberos-enabled servers and applications?

Options:

A.

Remote Authentication Dial In User Service (RADIUS)

B.

Internet service provider (ISP)

C.

Network Access Point (NAP)

D.

Key Distribution Center (KDC)

Buy Now
Questions 96

John works as a security manager in Mariotx.Inc. He has been tasked to resolve a network attack issue. To solve the problem, he first examines the critical information about the attacker's interaction to the network environment. He prepares a past record and behavioral document of the attack to find a direction of the solution. Then he decides to perform an action based on the previous hypothesis and takes the appropriate action against the attack. Which of the following strategies has John followed?

Options:

A.

Maneuver warfare

B.

Control theory

C.

SWOT Analysis

D.

OODA loop

Buy Now
Questions 97

Which of the following are application layer protocols of Internet protocol (IP) suite?

Each correct answer represents a complete solution. Choose two.

Options:

A.

IGP

B.

IGRP

C.

Telnet

D.

SMTP

Buy Now
Questions 98

Which of the following types of virus is capable of changing its signature to avoid detection?

Options:

A.

Stealth virus

B.

Boot sector virus

C.

Macro virus

D.

Polymorphic virus

Buy Now
Questions 99

Which of the following statements is not true about a digital certificate?

Options:

A.

It is used with both public key encryption and private key encryption.

B.

It is used with private key encryption.

C.

It is neither used with public key encryption nor with private key encryption.

D.

It is used with public key encryption.

Buy Now
Exam Code: GISF
Exam Name: GIAC Information Security Fundamentals
Last Update: Sep 15, 2025
Questions: 333
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now GISF