Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GIAC Certification GISF Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISF Premium Access

View all detail and faqs for the GISF exam


509 Students Passed

90% Average Score

93% Same Questions
Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions
Questions # 1:

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

Options:

A.

A risk probability-impact matrix

B.

Quantitative risk analysis

C.

Qualitative risk analysis

D.

Seven risk responses

Questions # 2:

Which of the following statements are TRUE regarding asymmetric encryption and symmetric encryption? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Data Encryption Standard (DES) is a symmetric encryption key algorithm.

B.

In symmetric encryption, the secret key is available only to the recipient of the message.

C.

Symmetric encryption is commonly used when a message sender needs to encrypt a large amount of data.

D.

Asymmetric encryption uses a public key and a private key pair for data encryption.

Questions # 3:

Which Wireless network standard operates at 2.4 GHz and transfers data at a rate of 54 Mbps?

Options:

A.

802.11a

B.

802.11n

C.

802.11b

D.

802.11g

Questions # 4:

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Boot sector

B.

Multipartite

C.

File

D.

Stealth

Questions # 5:

Which of the following protocols work at the Network layer of the OSI model?

Options:

A.

Internet Group Management Protocol (IGMP)

B.

Simple Network Management Protocol (SNMP)

C.

Routing Information Protocol (RIP)

D.

File Transfer Protocol (FTP)

Questions # 6:

In which type of access control do user ID and password system come under?

Options:

A.

Physical

B.

Power

C.

Technical

D.

Administrative

Questions # 7:

You are the project manager of a new project in your organization. You and the project team have identified the project risks, completed risk analysis, and are planning the most appropriate risk responses. Which of the following tools is most effective to choose the most appropriate risk response?

Options:

A.

Project network diagrams

B.

Delphi Technique

C.

Decision tree analysis

D.

Cause-and-effect diagrams

Questions # 8:

Which of the following objects in an Active Directory serve as security principles?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

User accounts

B.

Organizational units (OUs)

C.

Computer accounts

D.

Groups

Questions # 9:

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

Options:

A.

Quantitative risk analysis

B.

Risk audits

C.

Qualitative risk analysis

D.

Requested changes

Questions # 10:

Tom works as the project manager for BlueWell Inc. He is working with his project to ensure timely and appropriate generation, retrieval, distribution, collection, storage, and ultimate disposition of project information. What is the process in which Tom is working?

Options:

A.

Stakeholder expectation management

B.

Stakeholder analysis

C.

Work performance measurement

D.

Project communication management

Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.