Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISF Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISF Premium Access

View all detail and faqs for the GISF exam


853 Students Passed

89% Average Score

92% Same Questions
Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions
Questions # 61:

You work as a Software Developer for uCertify Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:

A.

Cryptographer

B.

Cryptographic toolkit

C.

Cryptosystem

D.

Cryptanalyst

Questions # 62:

The IT Director of the company is very concerned about the security of the network. Which audit policy should he implement to detect possible intrusions into the network? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

The success and failure auditing for policy change.

B.

The success and failure auditing for process tracking.

C.

The success and failure auditing for logon events.

D.

The success and failure auditing for privilege use.

Questions # 63:

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

Options:

A.

Antivirus

B.

Backup

C.

Symmetric encryption

D.

Firewall

Questions # 64:

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

Options:

A.

Antivirus log

B.

System log

C.

IDS log

D.

Firewall log

Questions # 65:

You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of ____.

Options:

A.

Bribery

B.

Irresponsible practice

C.

Illegal practice

D.

Conflict of interest

Questions # 66:

You have purchased a wireless router for your home network. What will you do first to enhance the security?

Options:

A.

Change the default password and administrator's username on the router

B.

Disable the network interface card on the computer

C.

Configure DMZ on the router

D.

Assign a static IP address to the computers

Questions # 67:

Which of the following types of firewall functions at the Session layer of OSI model?

Options:

A.

Circuit-level firewall

B.

Application-level firewall

C.

Switch-level firewall

D.

Packet filtering firewall

Questions # 68:

You work as a Product manager for Marioiss Inc. You have been tasked to start a project for securing the network of your company. You want to employ configuration management to efficiently manage the procedures of the project. What will be the benefits of employing configuration management for completing this project?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It provides the risk analysis of project configurations.

B.

It provides object, orient, decide and act strategy.

C.

It provides the versions for network devices.

D.

It provides a live documentation of the project.

Questions # 69:

At which OSI layer does UDP operate?

Options:

A.

Network layer

B.

Data-link layer

C.

Session layer

D.

Transport layer

E.

Presentation layer

Questions # 70:

Which of the following U.S.C. laws is governs the fraudulent activities associated with computers?

Options:

A.

18 U.S.C. 2251

B.

18 U.S.C. 3771

C.

18 U.S.C. 2257

D.

18 U.S.C. 1030

Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.