Certbus > GIAC > GIAC Information Security > GISF > GISF Online Practice Questions and Answers

GISF Online Practice Questions and Answers

Questions 4

Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

A. Cross-Site Request Forgery

B. Code injection attack

C. Cross-Site Scripting attack

D. Command injection attack

Browse 333 Q&As
Questions 5

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

A. Cyber squatting

B. Cyber Stalking

C. Man-in-the-middle attack

D. Spoofing

Browse 333 Q&As
Questions 6

Which of the following are some of the parts of a project plan? Each correct answer represents a complete solution. Choose all that apply.

A. Risk identification

B. Project schedule

C. Team members list

D. Risk analysis

Browse 333 Q&As
Questions 7

What does Wireless Transport Layer Security (WTLS) provide for wireless devices? Each correct answer represents a complete solution. Choose all that apply.

A. Data integrity

B. Authentication

C. Encryption

D. Bandwidth

Browse 333 Q&As
Questions 8

Which of the following is prepared by the business and serves as a starting point for producing the IT Service Continuity Strategy?

A. Disaster Invocation Guideline

B. Business Continuity Strategy

C. Index of Disaster-Relevant Information

D. Availability/ ITSCM/ Security Testing Schedule

Browse 333 Q&As
Questions 9

Which of the following processes is described in the statement below? "It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

A. Perform Quantitative Risk Analysis

B. Perform Qualitative Risk Analysis

C. Monitor and Control Risks

D. Identify Risks

Browse 333 Q&As
Questions 10

Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

A. Trademark laws

B. Patent laws

C. Copyright laws

D. Code Security law

Browse 333 Q&As
Questions 11

The workstations on your network utilize Windows XP (service pack 2 or later). Many users take their laptops on the road. You are very concerned about the security and want to have a robust firewall solution for mobile users. You have decided that all your firewalls to use the Stateful Packet Inspection (SPI) method. What must you do to provide SPI to your mobile users?

A. You must purchase a third party firewall solution for your mobile users.

B. Do nothing. Windows XP service pack 2 has a firewall turned on by default.

C. Download the SPI template from Microsoft.

D. Configure the Windows XP firewall to use SPI.

Browse 333 Q&As
Questions 12

Which of the following can be used to prevent routing loops in distance vector routing protocols? Each correct answer represents a complete solution. Choose two.

A. Split horizon

B. Link-state advertisement

C. Spanning Tree Protocol

D. Hold-down timers

Browse 333 Q&As
Questions 13

Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?

A. Proxy server

B. Cookies

C. Security

D. Certificate

Browse 333 Q&As
Questions 14

You discover that someone has been logging onto your network after office hours. After investigating this you find the login belongs to someone who left the company 12 months ago. What would have been the best method to prevent this?

A. A policy with time of day restrictions.

B. An IDS system.

C. A policy with account expiration.

D. A DMZ firewall.

Browse 333 Q&As
Questions 15

Which of the following protocols implements VPN using IPSec?

A. SLIP

B. PPTP

C. PPP

D. L2TP

Browse 333 Q&As
Questions 16

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

A. Bandwidth

B. Load

C. Delay

D. Frequency

Browse 333 Q&As
Questions 17

You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of ____.

A. Bribery

B. Irresponsible practice

C. Illegal practice

D. Conflict of interest

Browse 333 Q&As
Questions 18

You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

A. Vertical Privilege Escalation

B. Session Hijacking

C. Account hijacking

D. Horizontal Privilege Escalation

Browse 333 Q&As
Exam Code: GISF
Exam Name: GIAC Information Security Fundamentals
Last Update: Apr 26, 2024
Questions: 333 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99