Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?
A. Teardrop attack
B. SYN flood attack
C. Ping of Death attack
D. DDoS attack
Which of the following types of attack can guess a hashed password?
A. Teardrop attack
B. Evasion attack
C. Denial of Service attack
D. Brute force attack
Which of the following logs contains events pertaining to security as defined in the Audit policy?
A. DNS server log
B. Application log
C. System log
D. Directory Service log
E. Security log
F. File Replication Service log
You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of ____.
A. Bribery
B. Irresponsible practice
C. Illegal practice
D. Conflict of interest
Which of the following types of firewalls forms a session flow table?
A. Proxy server firewall
B. Packet filtering firewall
C. Stateless packet filtering firewall
D. Stateful packet filtering firewall
You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?
A. Risk Management Plan
B. Communications Management Plan
C. Stakeholder management strategy
D. Resource Management Plan
Which of the following are the types of Intrusion detection system?
A. Server-based intrusion detection system (SIDS)
B. Client based intrusion detection system (CIDS)
C. Host-based intrusion detection system (HIDS)
D. Network intrusion detection system (NIDS)
Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.
A. It is a digital representation of information that identifies users.
B. It uses asymmetric key pairs.
C. It provides security using data encryption and digital signature.
D. It uses symmetric key pairs.
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.
A. Dictionary attack
B. Rule based attack
C. Brute Force attack
D. Hybrid attack
Which of the following statements are true about classless routing protocols? Each correct answer represents a complete solution. Choose two.
A. They extend the IP addressing scheme.
B. The same subnet mask is used everywhere on the network.
C. They support VLSM and discontiguous networks.
D. IGRP is a classless routing protocol.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GISF exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.