New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

GISF GIAC Information Security Fundamentals Questions and Answers

Questions 4

Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?

Options:

A.

PING attack

B.

Spoofing

C.

Hacking

D.

SYN attack

Buy Now
Questions 5

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic project. Now, you want to know the IP address of the sender so that you can analyze various information such as the actual location, domain information, operating system being used, contact information, etc. of the email sender with the help of various tools and resources. You also want to check whether this email is fake or real. You know that analysis of email headers is a good starting point in such cases.

The email header of the suspicious email is given below:

What is the IP address of the sender of this email?

Options:

A.

209.191.91.180

B.

141.1.1.1

C.

172.16.10.90

D.

216.168.54.25

Buy Now
Questions 6

Which of the following is the best approach to conflict resolution?

Options:

A.

Hard work and understanding

B.

Mutual respect and cooperation

C.

Flexibility

D.

Sincerity and hard work

Buy Now
Questions 7

Which of the following are the levels of public or commercial data classification system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Sensitive

B.

Unclassified

C.

Confidential

D.

Public

E.

Secret

F.

Private

Buy Now
Questions 8

Peter is a merchant. He uses symmetric encryption to send confidential messages to different users of his Web site. Which of the following is the other name for asymmetric encryption?

Options:

A.

Session key encryption

B.

Public key encryption

C.

Secret key encryption

D.

Shared key encryption

Buy Now
Questions 9

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

Options:

A.

Bandwidth

B.

Load

C.

Delay

D.

Frequency

Buy Now
Questions 10

How should you configure USSOWA1 and USSTIME1 to allow secure access for remote employees?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose three.

Options:

A.

Place USSTIME1 on the internal network

B.

Place USSOWA1 on the internal network

C.

Enable all connections from external network

D.

Place USSTIME1 in a DMZ

E.

Place USSOWA1 in a DMZ

F.

Allow only TCP port 443 connections from the external network

G.

Allow only TCP port 80 connections from the external network

Buy Now
Questions 11

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Physical

B.

Administrative

C.

Automatic

D.

Technical

Buy Now
Questions 12

You are the Administrator for a corporate network. You are concerned about denial of service attacks. Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

Options:

A.

Shorten the timeout for connection attempts.

B.

Place a honey pot in the DMZ.

C.

Implement a strong password policy.

D.

Implement network based antivirus.

Buy Now
Questions 13

Web applications play a vital role in deploying different databases with user accessibility on the Internet. Which of the following allows an attacker to get unauthorized access to the database of a Web application by sending (attacking) user-supplied data to an interpreter as part of a command or query?

Options:

A.

Cross Site Scripting

B.

Injection flaw

C.

Cross Site Request Forgery (CSRF)

D.

Malicious File Execution

Buy Now
Questions 14

Which of the following is the process of making additional copies of data so that they may be used to restore the original after a data loss event?

Options:

A.

Data mining

B.

Back-up

C.

Data recovery

D.

File storage

Buy Now
Questions 15

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?

Options:

A.

Availability

B.

Integrity

C.

Confidentiality

D.

Authenticity

Buy Now
Questions 16

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.

Packet filter firewall

B.

Proxy-based firewall

C.

Stateful firewall

D.

Endian firew

Buy Now
Questions 17

You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company's network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?

Options:

A.

Teardrop attack

B.

Replay attack

C.

Denial-of-Service (DoS) attack

D.

Polymorphic shell code attack

Buy Now
Questions 18

You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?

Options:

A.

Network Based

B.

Dictionary

C.

Heuristic

D.

Host based

Buy Now
Questions 19

Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Maintaining cordial relationship with project sponsors

B.

Reporting your project management appearance

C.

Staying up-to-date with project management practices

D.

Staying up-to-date with latest industry trends and new technology

Buy Now
Questions 20

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

Options:

A.

Antivirus

B.

Backup

C.

Symmetric encryption

D.

Firewall

Buy Now
Questions 21

You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?

Options:

A.

Risk Management Plan

B.

Communications Management Plan

C.

Stakeholder management strategy

D.

Resource Management Plan

Buy Now
Questions 22

Which of the following is used in asymmetric encryption?

Options:

A.

Public key and user key

B.

Public key and private key

C.

SSL

D.

NTFS

Buy Now
Questions 23

Fred is the project manager for the TCC Company. His company has an internal policy that states each year they will provide free services to a nonprofit organization. Therefore, the company and its employees are not allowed to charge or receive money or gifts from the nonprofit organization they choose to provide free services. This year, the TCC Company offers to provide project management services to the children's hospital for a marketing campaign to raise money. Due to the TCC Company's project management services, the nonprofit agency exceeded previous years fund raising efforts. To show appreciation the nonprofit organization offered to reimburse the project manager for his travel expenses. Which of the following best describes how the project manager should handle the situation?

Options:

A.

Say thank you and let them pay for the travel, it is the least they can do.

B.

Tell the hospital no thank you and explain it is against company policy to accept payment for services provided to their pro bono customers.

C.

Say nothing as to not hurt the feelings of the children's hospital.

D.

Ask if the hospital could pay for some of the supplies too.

Buy Now
Questions 24

What is VeriSign?

Options:

A.

It is a data warehouse.

B.

It is an e-commerce portal.

C.

It is a search engine.

D.

It is a payment gateway.

Buy Now
Questions 25

Which of the following are the benefits of information classification for an organization?

Options:

A.

It helps identify which information is the most sensitive or vital to an organization.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes

C.

It helps identify which protections apply to which information.

D.

It helps reduce the Total Cost of Ownership (TCO).

Buy Now
Questions 26

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Options:

A.

Packet filtering

B.

Firewall

C.

Intrusion detection system (IDS)

D.

Demilitarized zone (DMZ)

Buy Now
Questions 27

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?

Options:

A.

Apply firewalls at appropriate spots.

B.

Download and install new firmware patch for the router.

C.

Disable the SSID broadcast feature of the router.

D.

Apply a standard ACL on the router.

Buy Now
Questions 28

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

Options:

A.

Antivirus log

B.

System log

C.

IDS log

D.

Firewall log

Buy Now
Questions 29

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

Options:

A.

Sending deceptive e-mails

B.

Sending notifications

C.

Shunning

D.

Logging

E.

Spoofing

F.

Network Configuration Changes

Buy Now
Questions 30

Which of the following are the types of Intrusion detection system?

Options:

A.

Server-based intrusion detection system (SIDS)

B.

Client based intrusion detection system (CIDS)

C.

Host-based intrusion detection system (HIDS)

D.

Network intrusion detection system (NIDS)

Buy Now
Questions 31

Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?

Options:

A.

Firewall

B.

Automatic Updating

C.

Other Security Settings

D.

Malware Protection

Buy Now
Questions 32

You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?

Options:

A.

Kerberos

B.

HTTPS

C.

RSA

D.

IPSEC

Buy Now
Questions 33

Which of the following protocols is used to prevent switching loops in networks with redundant switched paths?

Options:

A.

Cisco Discovery Protocol (CDP)

B.

Spanning Tree Protocol (STP)

C.

File Transfer Protocol (FTP)

D.

VLAN Trunking Protocol (VTP)

Buy Now
Questions 34

Which of the following types of attack can guess a hashed password?

Options:

A.

Teardrop attack

B.

Evasion attack

C.

Denial of Service attack

D.

Brute force attack

Buy Now
Questions 35

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Options:

A.

Cross-Site Request Forgery

B.

Code injection attack

C.

Cross-Site Scripting attack

D.

Command injection attack

Buy Now
Questions 36

Key Distribution Center is used in which authentication method?

Options:

A.

Multi-factor

B.

Smart cards

C.

Biometrics

D.

Security tokens

E.

Kerberos

F.

Challenge Handshake Authentication Protocol

Buy Now
Questions 37

Which of the following protocols provides secured transaction of data between two computers?

Options:

A.

SSH

B.

FTP

C.

Telnet

D.

RSH

Buy Now
Questions 38

You are configuring the Terminal service. What Protocols are required with Terminal services? (Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a part of the solution. Choose two.

Options:

A.

L2TP

B.

TCP/IP

C.

RDP

D.

CHAP

E.

PPTP

Buy Now
Questions 39

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Boot sector

B.

Multipartite

C.

File

D.

Stealth

Buy Now
Questions 40

Based on the case study, to implement more security, which of the following additional technologies should you implement for laptop computers?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose two.

Options:

A.

Encrypted Data Transmissions

B.

Digital certificates

C.

Two-factor authentication

D.

PAP authentication

E.

Encrypting File System (EFS)

Buy Now
Questions 41

Which of the following statements are TRUE regarding asymmetric encryption and symmetric encryption? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Data Encryption Standard (DES) is a symmetric encryption key algorithm.

B.

In symmetric encryption, the secret key is available only to the recipient of the message.

C.

Symmetric encryption is commonly used when a message sender needs to encrypt a large amount of data.

D.

Asymmetric encryption uses a public key and a private key pair for data encryption.

Buy Now
Questions 42

Which of the following statements is not true about a digital certificate?

Options:

A.

It is used with both public key encryption and private key encryption.

B.

It is used with private key encryption.

C.

It is neither used with public key encryption nor with private key encryption.

D.

It is used with public key encryption.

Buy Now
Questions 43

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

Options:

A.

Containment

B.

Identification

C.

Preparation

D.

Eradication

Buy Now
Questions 44

The security of a computer against the unauthorized usage largely depends upon the efficiency of the applied access control method. Which of the following statements are true about a computer access control method?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It can be based upon fingerprint or eye recognition.

B.

It can be time-synchronous.

C.

It provides security against the virus attacks.

D.

It provides security against Eavesdropping.

E.

It checks the authenticity of a person.

F.

It is used to encrypt a message before transmitting it on a network.

Buy Now
Questions 45

Which of the following is a remote access protocol that supports encryption?

Options:

A.

PPP

B.

SLIP

C.

UDP

D.

SNMP

Buy Now
Questions 46

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The virus, used by John, is not in the database of the antivirus program installed on the ser ver.

B.

The mutation engine of the virus is generating a new encrypted code.

C.

John has created a new virus.

D.

John has changed the signature of the virus.

Buy Now
Questions 47

Fill in the blank with the appropriate layer name.

The Network layer of the OSI model corresponds to the______ layer of the TCP/IP model.

Options:

Buy Now
Questions 48

You work as a security manager in Mariotiss Inc. Your enterprise has been facing network and software security threats since a few months. You want to renew your current security policies and management to enhance the safety of your information systems. Which of the following is the best practice to initiate the renewal process from the lowest level with the least managerial effort?

Options:

A.

Start the Incident handling process.

B.

Change the entire security policy.

C.

Perform an IT audit.

D.

Switch to a new network infrastructure.

Buy Now
Questions 49

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data?

Options:

A.

Symmetric

B.

Numeric

C.

Hashing

D.

Asymmetric

Buy Now
Exam Code: GISF
Exam Name: GIAC Information Security Fundamentals
Last Update: Dec 22, 2024
Questions: 333

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99