Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISF Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISF Premium Access

View all detail and faqs for the GISF exam


853 Students Passed

89% Average Score

92% Same Questions
Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions
Questions # 91:

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80.

Which of the following attacking methods can he use to send the dangerous software protocols?

Options:

A.

HTTP tunneling

B.

URL obfuscation

C.

Banner grabbing

D.

MAC spoofing

Questions # 92:

Which of the following categories of the network management model is used to detect and log network problems or device failures?

Options:

A.

Fault Management

B.

Configuration Management

C.

Security Management

D.

Performance Management

Questions # 93:

Cryptography is the science of?

Options:

A.

Encrypting and decrypting plain text messages.

B.

Decrypting encrypted text messages.

C.

Encrypting plain text messages.

D.

Hacking secure information.

Questions # 94:

The TCP/IP protocol suite uses ____ to identify which service a certain packet is destined for.

Options:

A.

Subnet masks

B.

IP addresses

C.

MAC addresses

D.

Port numbers

Questions # 95:

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Packet filtering firewall

B.

Application-level firewall

C.

Stateful inspection firewall

D.

Circuit-level firewall

Questions # 96:

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?

1. To account for all IT assets

2. To provide precise information support to other ITIL disciplines

3. To provide a solid base only for Incident and Problem Management

4. To verify configuration records and correct any exceptions

Options:

A.

2 and 4 only

B.

1, 3, and 4 only

C.

1, 2, and 4 only

D.

2, 3, and 4 only

Questions # 97:

You are developing an online business solution for National Institute of Meteorological and Oceanographic Research (NIMOR). A case study for the organization is given in the exhibit. Based on the case study, you need to implement Internet security so that no user can hack confidential data. According to you, which of the following security options will you use for your solution? Each correct answer represents a complete solution. Choose all that apply. (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Antivirus and antispyware software

B.

Secure Sockets Layer and digital certificates

C.

Firewall security

D.

Automatic Updates in Windows XP

Questions # 98:

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dictionary attack

B.

Rule based attack

C.

Brute Force attack

D.

Hybrid attack

Questions # 99:

You work as a Network Administrator for Tech World Inc. The company has a TCP/IP-based router. You have configured a router on your network. You want to accomplish the following goals:

l Configure the router to require a password to move from user EXEC mode to privileged EXEC mode.

l The password must be listed as a hidden entry in the configuration file.

You run the following command: enable password

Which of the goals will this action accomplish?

Options:

A.

The password will be listed as a hidden entry in the configuration file

B.

The action will accomplish neither of the goals

C.

The action will accomplish both the goals

D.

The router will require a password to move from user EXEC mode to privileged EXEC mode

Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.