[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISF Dumps with VCE and PDF 131-140

CollectDumps 2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!

GIAC Information Security Fundamentals

Question No: 131 – (Topic 1)

You are configuring the Terminal service. What Protocols are required with Terminal services? (Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a part of the solution. Choose two.

  1. L2TP

  2. TCP/IP

  3. RDP

  4. CHAP

  5. PPTP

Answer: B,C

Question No: 132 – (Topic 1)

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system. He wants to sniff the weare- secure network and intercept a conversation between two employees of the

company through session hijacking. Which of the following tools will John use to accomplish the task?

  1. Hunt

  2. IPChains

  3. Ethercap

  4. Tripwire

Answer: A

Question No: 133 – (Topic 1)

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data?

  1. Symmetric

  2. Numeric

  3. Hashing

  4. Asymmetric

Answer: D

Question No: 134 – (Topic 1)

You work as a Security manager for Qualoxizz Inc. Your company has number of network switches in the site network infrastructure. Which of the following actions will you perform to ensure the security of the switches in your company?

  1. Set long session timeouts.

  2. Open up all the unused management ports.

  3. Set similar passwords for each management port.

  4. Ignore usage of the default account settings.

Answer: D

Question No: 135 – (Topic 1)

Key Distribution Center is used in which authentication method?

  1. Multi-factor

  2. Smart cards

  3. Biometrics

  4. Security tokens

  5. Kerberos

  6. Challenge Handshake Authentication Protocol

Answer: E

Question No: 136 – (Topic 1)

Which of the following statements about digital signature is true?

  1. Digital signature is required for an e-mail message to get through a firewall.

  2. Digital signature verifies the identity of the person who applies it to a document.

  3. Digital signature decrypts the contents of documents.

  4. Digital signature compresses the message to which it is applied.

Answer: B

Question No: 137 – (Topic 1)

Which of the following is a valid IP address for class B Networks?





Answer: A

Question No: 138 – (Topic 1)

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run

necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

  1. Boot sector

  2. Multipartite

  3. File

  4. Stealth

Answer: A,B

Question No: 139 – (Topic 1)

You work as a security manager for hackoxiss Inc. The company consists of a perimeter network as its internal network. A number of ethical hackers are employed in the company. You are getting complaints that some employees of the company are trying to intrude other systems on the outer network (Internet). In which of the following ways will you secure the internal as well as the outer network?

  1. Deny the access of outer users to internal network.

  2. Use distributed firewalls.

  3. Deny the access of internal users to outer network.

  4. Configure ACL on your company#39;s router.

Answer: B

Question No: 140 – (Topic 1)

Which project management risk event would you be using if you changed the sequence of activities to reduce the probability of the project being delayed?

  1. Enhancing

  2. Withdrawal

  3. Exploiting

  4. Avoidance

Answer: D

100% Free Download!
Download Free Demo:GISF Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISF Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE