[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISF Dumps with VCE and PDF 111-120

CollectDumps 2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISF.html

GIAC Information Security Fundamentals

Question No: 111 – (Topic 1)

Which of the following is used to authenticate asymmetric keys?

  1. Digital signature

  2. MAC Address

  3. Password

  4. Demilitarized zone (DMZ)

Answer: A

Question No: 112 – (Topic 1)

Tom works as the project manager for BlueWell Inc. He is working with his project to ensure timely and appropriate generation, retrieval, distribution, collection, storage, and ultimate disposition of project information. What is the process in which Tom is working?

  1. Stakeholder expectation management

  2. Stakeholder analysis

  3. Work performance measurement

  4. Project communication management

Answer: D

Question No: 113 – (Topic 1)

Which of the following is a remote access protocol that supports encryption?

  1. PPP

  2. SLIP

  3. UDP

  4. SNMP

Answer: A

Question No: 114 – (Topic 1)

Which of the following processes is described in the statement below?

quot;It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project.quot;

  1. Perform Quantitative Risk Analysis

  2. Perform Qualitative Risk Analysis

  3. Monitor and Control Risks

  4. Identify Risks

Answer: C

Question No: 115 – (Topic 1)

Which of the following objects in an Active Directory serve as security principles? Each correct answer represents a part of the solution. Choose all that apply.

  1. User accounts

  2. Organizational units (OUs)

  3. Computer accounts

  4. Groups

Answer: A,C,D

Question No: 116 – (Topic 1)

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

  1. Authentication

  2. Confidentiality

  3. Integrity

  4. Non-repudiation

Answer: B

Question No: 117 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters =#39;or#39;#39;=#39; as a username and successfully logs in to the user page of the Web site. The We-are-secure login page is vulnerable to a .

  1. Social engineering

  2. Smurf DoS

  3. Brute force

  4. Ping flood attack

Answer: A

Question No: 118 – (Topic 1)

Which of the following is an organization that defines standards for anti-virus software?

  1. ICSA

  2. IETF

  3. IIS

  4. IEEE

Answer: A

Question No: 119 – (Topic 1)

Which of the following types of attacks cannot be prevented by technical measures only?

  1. Social engineering

  2. Smurf DoS

  3. Brute force

  4. Ping flood attack

Answer: A

Question No: 120 – (Topic 1)

Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?

  1. Asymmetric

  2. Symmetric

  3. Numeric

  4. Hashing

Answer: B

100% Free Download!
Download Free Demo:GISF Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISF Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE