Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GISF Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GISF Premium Access

View all detail and faqs for the GISF exam


853 Students Passed

89% Average Score

92% Same Questions
Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
Questions # 81:

You want to install a server that can be accessed by external users. You also want to ensure that these users cannot access the rest of the network. Where will you place the server?

Options:

A.

Intranet

B.

Local Area Network

C.

Internet

D.

Demilitarized Zone

E.

Extranet

F.

Wide Area Network

Questions # 82:

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Console

B.

Sensor

C.

Firewall

D.

Modem

E.

Gateway

Questions # 83:

Which of the following are used as primary technologies to create a layered defense for giving protection to a network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Vulnerability

B.

Firewall

C.

Endpoint authentication

D.

IDS

Questions # 84:

Which of the following attacks saturates network resources and disrupts services to a specific computer?

Options:

A.

Teardrop attack

B.

Replay attack

C.

Denial-of-Service (DoS) attack

D.

Polymorphic shell code attack

Questions # 85:

You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?

Options:

A.

Utilize protocol analyzers.

B.

User performance monitors.

C.

Implement signature based antivirus.

D.

Implement an anomaly based IDS.

Questions # 86:

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.

The tool uses raw IP packets to determine the following:

What ports are open on our network systems.

What hosts are available on the network.

Identify unauthorized wireless access points.

What services (application name and version) those hosts are offering.

What operating systems (and OS versions) they are running.

What type of packet filters/firewalls are in use.

Which of the following tools is Victor using?

Options:

A.

Nessus

B.

Kismet

C.

Nmap

D.

Sniffer

Questions # 87:

Which of the following is the main purpose of using OODA loops?

Options:

A.

Providing economic balance

B.

Making the information delivery process faster

C.

Information welfare

D.

Creating advanced military weapons

Questions # 88:

Which of the following types of firewalls looks deep into packets and makes granular access control decisions?

Options:

A.

Stateful

B.

Application level proxy

C.

Circuit level proxy

D.

Packet filtering

Questions # 89:

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you want to apply Windows firewall setting to all the computers in the domain to improve security.

Which of the following is the fastest and the most effective way to accomplish the task?

Options:

A.

Apply firewall settings manually.

B.

Apply firewall settings on the domain controller of the domain.

C.

Use group policy to apply firewall settings.

D.

Use a batch file to apply firewall setting.

Questions # 90:

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

Options:

A.

Smurf DoS attack

B.

Teardrop attack

C.

Fraggle DoS attack

D.

Ping flood attack

Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.