Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISF Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISF Premium Access

View all detail and faqs for the GISF exam


853 Students Passed

89% Average Score

92% Same Questions
Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following types of attacks cannot be prevented by technical measures only?

Options:

A.

Social engineering

B.

Smurf DoS

C.

Brute force

D.

Ping flood attack

Questions # 22:

Your company is going to add wireless connectivity to the existing LAN. You have concerns about the security of the wireless access and wish to implement encryption. Which of the following would be the best choice for you to use?

Options:

A.

WAP

B.

WEP

C.

DES

D.

PKI

Questions # 23:

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

Options:

A.

Install a DMZ firewall

B.

Enable verbose logging on the firewall

C.

Install a host-based IDS

D.

Install a network-based IDS

Questions # 24:

Mark is implementing security on his e-commerce site. He wants to ensure that a customer sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?

Options:

A.

Packet filtering

B.

Authentication

C.

Firewall

D.

Digital signature

Questions # 25:

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Authentication

B.

Confidentiality

C.

Integrity

D.

Non-repudiation

Questions # 26:

You want to ensure that everyone who sends you an email should encrypt it. However you do not wish to exchange individual keys with all people who send you emails. In order to accomplish this goal which of the following should you choose?

Options:

A.

DES

B.

AES

C.

Symmetric Encryption

D.

Public Key encryption

Questions # 27:

A Cisco Unified Wireless Network has an AP that does not rely on the central control device of the network. Which type of AP has this characteristic?

Options:

A.

Lightweight AP

B.

Rogue AP

C.

LWAPP

D.

Autonomous AP

Questions # 28:

Which of the following types of authentications supported by OSPF?

Each correct answer represents a complete solution. Choose three.

Options:

A.

MD5 authentication

B.

Simple password authentication

C.

Null authentication

D.

Kerberos v5 authentication

Questions # 29:

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?

Options:

A.

Configure Network address translation (NAT).

B.

Disable Windows firewall logging.

C.

Configure Internet Protocol Security (IPSec).

D.

Enable Windows firewall logging.

Questions # 30:

Which of the following are some of the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Risk identification

B.

Project schedule

C.

Team members list

D.

Risk analysis

Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.