Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISF Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISF Premium Access

View all detail and faqs for the GISF exam


853 Students Passed

89% Average Score

92% Same Questions
Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following statements are true about classless routing protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

They extend the IP addressing scheme.

B.

The same subnet mask is used everywhere on the network.

C.

They support VLSM and discontiguous networks.

D.

IGRP is a classless routing protocol.

Questions # 72:

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

Options:

A.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

B.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

C.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer

D.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

Questions # 73:

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Options:

A.

S/MIME

B.

Asymmetric

C.

PGP

D.

Symmetric

Questions # 74:

The workstations on your network utilize Windows XP (service pack 2 or later). Many users take their laptops on the road. You are very concerned about the security and want to have a robust firewall solution for mobile users. You have decided that all your firewalls to use the Stateful Packet Inspection (SPI) method. What must you do to provide SPI to your mobile users?

Options:

A.

You must purchase a third party firewall solution for your mobile users.

B.

Do nothing. Windows XP service pack 2 has a firewall turned on by default.

C.

Download the SPI template from Microsoft.

D.

Configure the Windows XP firewall to use SPI.

Questions # 75:

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

Options:

A.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

B.

HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"

C.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

D.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

Questions # 76:

Web applications play a vital role in deploying different databases with user accessibility on the Internet. Which of the following allows an attacker to get unauthorized access to the database of a Web application by sending (attacking) user-supplied data to an interpreter as part of a command or query?

Options:

A.

Cross Site Scripting

B.

Injection flaw

C.

Cross Site Request Forgery (CSRF)

D.

Malicious File Execution

Questions # 77:

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows 2008 member servers and 250 Windows Vista client computers. One of the member servers works as a Web server that hosts an intranet Web site. According to the company security policy, Mark needs to fulfill the following requirements:

1. Encryption should be used for authentication of all traffic to the Web site.

2. SSL should not be used on the Web server for performance reasons.

3. Users should be authenticated using their Active Directory credentials.

In order to fulfill the requirements, Mark has disabled the Anonymous Authentication setting on the server. What else does he have to do?

Options:

A.

Enable the Anonymous Authentication setting on the server.

B.

Enable the Encrypting File System (EFS) on the server.

C.

Enable the Digest Authentication setting on the server.

D.

Enable the Windows Authentication setting on the server.

Questions # 78:

Which of the following refers to the process of verifying the identity of a person, network host, or system process?

Options:

A.

Hacking

B.

Authentication

C.

Packet filtering

D.

Auditing

Questions # 79:

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

Options:

A.

Organizing a solution to remove an incident

B.

Building up an incident response kit

C.

Working with QA to validate security of the enterprise

D.

Setting up the initial position after an incident

Questions # 80:

Which of the following is NOT a phase of the OODA Loop strategy?

Options:

A.

Observe

B.

Define

C.

Orient

D.

Act

Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.