[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISF Dumps with VCE and PDF 151-160

CollectDumps 2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISF.html

GIAC Information Security Fundamentals

Question No: 151 CORRECT TEXT – (Topic 2)

Fill in the blank with the appropriate value. SHA-1 produces a -bit message digest.

Answer: SHA-1 produces a160-bit message digest

Question No: 152 – (Topic 2)

Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

  1. Trademark laws

  2. Patent laws

  3. Copyright laws

  4. Code Security law

Answer: B

Question No: 153 – (Topic 2)

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company#39;s security policy, you want to apply Windows firewall setting to all the computers in the domain to improve security.

Which of the following is the fastest and the most effective way to accomplish the task?

  1. Apply firewall settings manually.

  2. Apply firewall settings on the domain controller of the domain.

  3. Use group policy to apply firewall settings.

  4. Use a batch file to apply firewall setting.

Answer: C

Question No: 154 – (Topic 2)

You work as a Network Administrator for Infosec Inc. You find that not only have security applications running on the server, including software firewalls, anti-virus programs, and anti-spyware programs been disabled, but anti-virus and anti-spyware definitions have also been deleted. You suspect that this situation has arisen due to malware infection. Which of the following types of malware is the most likely cause of the issue?

  1. Whack-A-Mole

  2. FireKiller 2000

  3. Beast

  4. SubSeven

Answer: B

Question No: 155 – (Topic 2)

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?

Each correct answer represents a complete solution. Choose all that apply.

  1. Slack space

  2. Unused Sectors

  3. Dumb space

  4. Hidden partition

Answer: A,B,D

Question No: 156 – (Topic 2)

Firekiller 2000 is an example of a .

  1. DoS attack Trojan

  2. Data sending Trojan

  3. Remote access Trojan

  4. Security software disabler Trojan

Answer: D

Question No: 157 – (Topic 2)

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

  1. Availability

  2. Integrity

  3. Confidentiality

  4. Non-repudiation

Answer: B

Question No: 158 – (Topic 2)

You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company#39;s Website. Which of the following methods of investigation can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.

  2. Look at the Web servers logs and normal traffic logging.

  3. Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.

  4. Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company#39;s site.

Answer: A,B,D

Question No: 159 – (Topic 2)

A company would like your consulting firm to review its current network and suggest changes that will increase its efficiency and optimize the business processes.

To design such a network, you prepare a case study.

Which of the following policies should be implemented through a group policy that is associated with the netperfect.com domain?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose all that apply.

  1. Account lockout policy.

  2. Password policy.

  3. Limit computers that can access production schedule software.

  4. Assign MS Office suite to appropriate users.

Answer: A,B,D

Question No: 160 – (Topic 2)

Which two security components should you implement on the sales personnel portable computers to increase security?

(Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose two.

  1. Remote access policy

  2. L2TP over IPSec

  3. PPTP

  4. Remote Authentication Dial-In User Service (RADIUS)

  5. Encrypting File System (EFS)

Answer: B,E

100% Free Download!
Download Free Demo:GISF Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISF Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE