Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISF Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISF Premium Access

View all detail and faqs for the GISF exam


853 Students Passed

89% Average Score

92% Same Questions
Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions
Questions # 11:

The SALES folder has a file named XFILE.DOC that contains critical information about your company. This folder resides on an NTFS volume. The company's Senior Sales Manager asks you to provide security for that file. You make a backup of that file and keep it in a locked cupboard, and then you deny access on the file for the Sales group. John, a member of the Sales group, accidentally deletes that file. You have verified that John is not a member of any other group.

Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file.

What is the most likely cause?

Options:

A.

The Sales group has the Full Control permission on the SALES folder.

B.

The Deny Access permission does not work on files.

C.

The Deny Access permission does not restrict the deletion of files.

D.

John is a member of another group having the Full Control permission on that file.

Questions # 12:

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

Options:

A.

Electronic Communications Privacy Act of 1986

B.

Economic Espionage Act of 1996

C.

Computer Fraud and Abuse Act

D.

Wiretap Act

Questions # 13:

How should you configure the Regional Centers' e-mail, so that it is secure and encrypted?

(Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Use EFS.

B.

Use IPSec.

C.

Use S/MIME.

D.

Use TLS.

Questions # 14:

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

Options:

A.

Containment

B.

Identification

C.

Preparation

D.

Eradication

Questions # 15:

You work as a security manager for Qualxiss Inc. Your Company involves OODA loop for resolving and deciding over company issues. You have detected a security breach issue in your company.

Which of the following procedures regarding the breach is involved in the observe phase of the OODA loop?

Options:

A.

Follow the company security guidelines.

B.

Decide an activity based on a hypothesis.

C.

Implement an action practically as policies.

D.

Consider previous experiences of security breaches.

Questions # 16:

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

Options:

A.

Cross-Site Request Forgery

B.

Code injection attack

C.

Cross-Site Scripting attack

D.

Command injection attack

Questions # 17:

Which of the following tools are used to determine the hop counts of an IP packet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Netstat

B.

Ping

C.

TRACERT

D.

IPCONFIG

Questions # 18:

Which of the following are the goals of the cryptographic systems?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Availability

B.

Authentication

C.

Confidentiality

D.

Integrity

Questions # 19:

You are configuring the Terminal service. What Protocols are required with Terminal services? (Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a part of the solution. Choose two.

Options:

A.

L2TP

B.

TCP/IP

C.

RDP

D.

CHAP

E.

PPTP

Questions # 20:

You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?

Options:

A.

Use Incident handling

B.

Use OODA loop

C.

Use Information assurance

D.

Use SMART model.

Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.