Exam Details

  • Exam Code
    :GISF
  • Exam Name
    :GIAC Information Security Fundamentals
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :333 Q&As
  • Last Updated
    :May 16, 2024

GIAC GIAC Information Security GISF Questions & Answers

  • Question 21:

    You work as a Software Developer for uCertify Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

    A. Cryptographer

    B. Cryptographic toolkit

    C. Cryptosystem

    D. Cryptanalyst

  • Question 22:

    Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.

    A. Maintaining cordial relationship with project sponsors

    B. Reporting your project management appearance

    C. Staying up-to-date with project management practices

    D. Staying up-to-date with latest industry trends and new technology

  • Question 23:

    You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

    A. Recovery

    B. Contamination

    C. Identification

    D. Eradication

    E. Preparation

  • Question 24:

    What is VeriSign?

    A. It is a data warehouse.

    B. It is an e-commerce portal.

    C. It is a search engine.

    D. It is a payment gateway.

  • Question 25:

    You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

    A. Antivirus log

    B. System log

    C. IDS log

    D. Firewall log

  • Question 26:

    The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

    A. Sending deceptive e-mails

    B. Sending notifications

    C. Shunning

    D. Logging

    E. Spoofing

    F. Network Configuration Changes

  • Question 27:

    You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?

    A. Network Based

    B. Dictionary

    C. Heuristic

    D. Host based

  • Question 28:

    Which of the following statements about a brute force attack is true?

    A. It is a program that allows access to a computer without using security checks.

    B. It is an attack in which someone accesses your e-mail server and sends misleading information to others.

    C. It is a virus that attacks the hard drive of a computer.

    D. It is a type of spoofing attack.

    E. It is an attempt by an attacker to guess passwords until he succeeds.

  • Question 29:

    The IT Director of the company is very concerned about the security of the network. Which audit policy should he implement to detect possible intrusions into the network? (Click the Exhibit button on the toolbar to see the case study.)

    A. The success and failure auditing for policy change.

    B. The success and failure auditing for process tracking.

    C. The success and failure auditing for logon events.

    D. The success and failure auditing for privilege use.

  • Question 30:

    You are the project manager for a software technology company. You and the project team have identified that the executive staff is not fully committed to the project. Which of the following best describes the risk?

    A. Residual risks

    B. Trend analysis

    C. Schedule control

    D. Organizational risks

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GISF exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.