Exam Details

  • Exam Code
    :GISF
  • Exam Name
    :GIAC Information Security Fundamentals
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :333 Q&As
  • Last Updated
    :May 16, 2024

GIAC GIAC Information Security GISF Questions & Answers

  • Question 11:

    You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

    A. Vertical Privilege Escalation

    B. Session Hijacking

    C. Account hijacking

    D. Horizontal Privilege Escalation

  • Question 12:

    Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?

    A. Firewall

    B. Automatic Updating

    C. Other Security Settings

    D. Malware Protection

  • Question 13:

    Rick works as a Network Administrator for Fimbry Hardware Inc. Based on the case study, which network routing strategy will he implement for the company? (Click the Exhibit button on the toolbar to see the case study.)

    A. He will implement OSPF on all the router interfaces.

    B. He will implement RIP v1 on all the router interfaces.

    C. He will implement the IGMP on all the router interface.

    D. He will implement RIP v2 on all the router interfaces.

    E. He will implement static routes for the routers.

  • Question 14:

    You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

    A. FTP

    B. Gopher

    C. Firewall

    D. HTTP

  • Question 15:

    Which of the following wireless security features provides the best wireless security mechanism?

    A. WPA with 802.1X authentication

    B. WPA with Pre Shared Key

    C. WPA

    D. WEP

  • Question 16:

    Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

    A. Packet filtering

    B. Firewall

    C. Intrusion detection system (IDS)

    D. Demilitarized zone (DMZ)

  • Question 17:

    John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

    A. Antivirus

    B. Backup

    C. Symmetric encryption

    D. Firewall

  • Question 18:

    Which of the following devices or hardware parts employs SMART model system as a monitoring system?

    A. Modem

    B. RAM

    C. Hard disk

    D. IDS

  • Question 19:

    You have purchased a wireless router for your home network. What will you do first to enhance the security?

    A. Change the default password and administrator's username on the router

    B. Disable the network interface card on the computer

    C. Configure DMZ on the router

    D. Assign a static IP address to the computers

  • Question 20:

    Fred is the project manager for the TCC Company. His company has an internal policy that states each year they will provide free services to a nonprofit organization. Therefore, the company and its employees are not allowed to charge or receive money or gifts from the nonprofit organization they choose to provide free services. This year, the TCC Company offers to provide project management services to the children's hospital for a marketing campaign to raise money. Due to the TCC Company's project management services, the nonprofit agency exceeded previous years fund raising efforts. To show appreciation the nonprofit organization offered to reimburse the project manager for his travel expenses. Which of the following best describes how the project manager should handle the situation?

    A. Say thank you and let them pay for the travel, it is the least they can do.

    B. Tell the hospital no thank you and explain it is against company policy to accept payment for services provided to their pro bono customers.

    C. Say nothing as to not hurt the feelings of the children's hospital.

    D. Ask if the hospital could pay for some of the supplies too.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GISF exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.