[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISF Dumps with VCE and PDF 101-110

CollectDumps 2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISF.html

GIAC Information Security Fundamentals

Question No: 101 – (Topic 1)

Which of the following are the examples of administrative controls?

Each correct answer represents a complete solution. Choose all that apply.

  1. Data Backup

  2. Security policy

  3. Security awareness training

  4. Auditing

Answer: B,C

Question No: 102 – (Topic 1)

Which of the following statements about Secure Shell (SSH) are true? Each correct answer represents a complete solution. Choose three.

  1. It was designed as a replacement for TELNET and other insecure shells.

  2. It is a network protocol used primarily on Linux and Unix based systems.

  3. It allows data to be exchanged using a secure channel between two networked devices.

  4. It is the core routing protocol of the Internet.

Answer: A,B,C

Question No: 103 – (Topic 1)

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions, which is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed?

Each correct answer represents a complete solution. Choose all that apply.

  1. Attacker can exploit any protocol used to go into the internal network or intranet of the com pany.

  2. Attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different.

  3. Attacker can gain access to the Web server in a DMZ and exploit the database.

  4. Attacker can perform Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network.

Answer: A,C,D

Question No: 104 – (Topic 1)

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

  1. Quantitative risk analysis

  2. Risk audits

  3. Qualitative risk analysis

  4. Requested changes

Answer: D

Question No: 105 – (Topic 1)

John works as a Network Administrator for Bordeaux Inc. He is planning to design a strategy, so that the employees can connect to a scheduling application. Which of the following strategies is best suited for the company?

(Click the Exhibit button on the toolbar to see the case study.)

  1. Deploy a VPN server on the VLAN network, and an IIS server on the corporate LAN at the headquarters.

  2. Deploy a VPN server on the VLAN network, and an IIS server on DMZ.

  3. Deploy a VPN server on the corporate LAN at the headquarters, and an IIS server on DMZ.

  4. Deploy a VPN server on DMZ, and an IIS server on the corporate LAN at the headquarters.

Answer: D

Question No: 106 – (Topic 1)

Based on the case study, to implement more security, which of the following additional technologies should you implement for laptop computers?

(Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose two.

  1. Encrypted Data Transmissions

  2. Digital certificates

  3. Two-factor authentication

  4. PAP authentication

  5. Encrypting File System (EFS)

Answer: B,E

Question No: 107 – (Topic 1)

Security is responsible for well-being of information and infrastructures in which the possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security?

Each correct answer represents a complete solution. Choose all that apply.

  1. Availability

  2. Confidentiality

  3. Confidentiality

  4. Authenticity

Answer: A,B,C,D

Question No: 108 – (Topic 1)

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host?

  1. Blackbox testing

  2. Firewalking

  3. Brainstorming

  4. Port redirection

Answer: D

Question No: 109 – (Topic 1)

Which of the following is prepared by the business and serves as a starting point for producing the IT Service Continuity Strategy?

  1. Disaster Invocation Guideline

  2. Business Continuity Strategy

  3. Index of Disaster-Relevant Information

  4. Availability/ ITSCM/ Security Testing Schedule

Answer: B

Question No: 110 – (Topic 1)

Your network utilizes a coax cable for connections between various network segments. Your predecessor made sure none of the coax cables were in an exposed area that could easily be accessed. This caused the use of significant extra cabling. Why do you think this was done?

  1. This was an error you should correct. It wastes the cable and may make maintenance more difficult.

  2. He was concerned about wireless interception of data.

  3. He was concerned about electromagnetic emanation being used to gather data.

  4. He was concerned about vampire taps.

Answer: D

100% Free Download!
Download Free Demo:GISF Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISF Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE