Pass4itsure > GIAC > GIAC Certifications > GISF > GISF Online Practice Questions and Answers

GISF Online Practice Questions and Answers

Questions 4

Which of the following statements about asymmetric encryption are true? Each correct answer represents a complete solution. Choose two.

A. Asymmetric encryption is faster as compared to symmetric encryption.

B. Asymmetric encryption uses a public key and a private key pair for data encryption.

C. In asymmetric encryption, only one key is needed to encrypt and decrypt data.

D. In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.

Buy Now
Questions 5

Which of the following are some of the parts of a project plan? Each correct answer represents a complete solution. Choose all that apply.

A. Risk identification

B. Project schedule

C. Team members list

D. Risk analysis

Buy Now
Questions 6

You are the security manager of Microliss Inc. Your enterprise uses a wireless network infrastructure with

access points ranging 150-350 feet. The employees using the network complain that their passwords and

important official information have been traced. You discover the following clues:

The information has proved beneficial to another company. The other company is located about 340 feet

away from your office.

The other company is also using wireless network.

The bandwidth of your network has degraded to a great extent.

Which of the following methods of attack has been used?

A. A piggybacking attack has been performed.

B. The information is traced using Bluebugging.

C. A DOS attack has been performed.

D. A worm has exported the information.

Buy Now
Questions 7

You work as a SharePoint Administrator for TechWorld Inc. You must protect your SharePoint server farm from viruses that are accidentally uploaded to the SharePoint libraries. You have installed antivirus software that is designed for use with Windows SharePoint server. You have logged on to the Central Administration site. How can you configure the SharePoint site so that the document libraries are protected?

A. SharePoint does not support antivirus solutions.

B. Restrict users to read only on document libraries.

C. Choose the Scan documents on upload option in the antivirus settings.

D. Require all documents to be scanned on the local PC before uploading to the SharePoint sit e.

Buy Now
Questions 8

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site. The We-are-secure login page is vulnerable to a __________.

A. Social engineering

B. Smurf DoS

C. Brute force

D. Ping flood attack

Buy Now
Questions 9

Which of the following refers to encrypted text?

A. Plaintext

B. Cookies

C. Ciphertext

D. Hypertext

Buy Now
Questions 10

You work as a Security manager for Orangesect Inc. The enterprise is using the OODA loop strategy to counter the security issues in the enterprise. Some of the IP addresses of the enterprise have been hacked. You match up the present hacking issue and condition with the past hacking experiences to find a solution. Which of the following phases of the OODA loop involves the procedure followed by you?

A. The decide phase

B. The orient phase

C. The observe phase

D. The act phase

Buy Now
Questions 11

Jane works as a Consumer Support Technician for McRoberts Inc. The company provides troubleshooting support to users. A user named Peter installs Windows Vista on his computer. He connects his computer on the network. He wants to protect his computer from malicious software and prevent hackers from gaining access to his computer through the network. Which of the following actions will Jane assist Peter to perform to accomplish the task?

A. Don't stay logged on as an administrator.

B. Use a firewall.

C. Keep the computer up-to-date.

D. Run antivirus software on the computer.

Buy Now
Questions 12

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

A. Antivirus log

B. System log

C. IDS log

D. Firewall log

Buy Now
Questions 13

Which of the following is used in asymmetric encryption?

A. Public key and user key

B. Public key and private key

C. SSL

D. NTFS

Buy Now
Exam Code: GISF
Exam Name: GIAC Information Security Fundamentals (GISF)
Last Update: Jan 03, 2025
Questions: 333
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99