Which of the following methods of encryption uses a single key to encrypt and decrypt data?
A. S/MIME
B. Asymmetric
C. PGP
D. Symmetric
Mark works as a Network Administrator for NetTech Inc. The network uses routers from multiple vendors. Mark wants to implement a routing protocol on the company's network that provides VLSM support, scalability and minimal overhead on the network. Which of the following protocols will Mark use to fulfill the requirements?
A. RIPv1
B. EIGRP
C. CDP
D. OSPF
Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers? Each correct answer represents a complete solution. Choose all that apply.
A. KFSensor
B. Sheep dip
C. Enum
D. SocketShield
In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?
A. Bandwidth
B. Load
C. Delay
D. Frequency
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
A. TCP FTP proxy scanning
B. Eavesdropping
C. Fingerprinting
D. Web ripping
Which of the following protocols implements VPN using IPSec?
A. SLIP
B. PPTP
C. PPP
D. L2TP
You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?
A. Antivirus software
B. Gateway
C. Firewall
D. Bridge
Jane works as a Consumer Support Technician for McRoberts Inc. The company provides troubleshooting support to users. A user named Peter installs Windows Vista on his computer. He connects his computer on the network. He wants to protect his computer from malicious software and prevent hackers from gaining access to his computer through the network. Which of the following actions will Jane assist Peter to perform to accomplish the task?
A. Don't stay logged on as an administrator.
B. Use a firewall.
C. Keep the computer up-to-date.
D. Run antivirus software on the computer.
Which of the following processes is responsible for low risk, frequently occurring low cost changes?
A. Incident Management
B. IT Facilities Management
C. Request Fulfillment
D. Release Management
The executive team wants you to track labor costs for your project as well as progress on task completion and the resulting dates. What information must you update for tasks to provide this information?
A. Start, Work, and Remaining Work
B. Actual Start and Percent Complete
C. Actual Start, Actual Work, and Remaining Work
D. Actual Start, Percent Complete, and Remaining Duration
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GISF exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.