[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISF Dumps with VCE and PDF 181-190

CollectDumps 2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISF.html

GIAC Information Security Fundamentals

Question No: 181 – (Topic 2)

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

  1. Organizing a solution to remove an incident

  2. Building up an incident response kit

  3. Working with QA to validate security of the enterprise

  4. Setting up the initial position after an incident

Answer: B

Question No: 182 – (Topic 2)

Which of the following types of firewall functions at the Session layer of OSI model?

  1. Circuit-level firewall

  2. Application-level firewall

  3. Switch-level firewall

  4. Packet filtering firewall

Answer: A

Question No: 183 – (Topic 2)

The method used to encrypt messages by transposing or scrambling the characters in a certain manner is known as .

  1. Quantum cipher

  2. Transposition cipher

  3. Hybrid systems

  4. Mathematical cipher

  5. Substitution cipher

  6. Steganography

Answer: B

Question No: 184 – (Topic 2)

Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?

  1. PING attack

  2. Spoofing

  3. Hacking

  4. SYN attack

Answer: D

Question No: 185 – (Topic 2)

Which of the following is used to determine whether or not a principal is allowed to perform a requested action?

  1. Authentication

  2. Security policy

  3. Authorization

  4. Principal

Answer: C

Question No: 186 – (Topic 2)

Which of the following prevents malicious programs from attacking a system?

  1. Smart cards

  2. Anti-virus program

  3. Firewall

  4. Biometric devices

Answer: B

Question No: 187 – (Topic 2)

Bluetooth uses the specification in the band with FHSS technology.

A. IEEE 802.11, 2.4-2.5 GHz

B. IEEE 802.11, 1.4-2.5 GHz

C. IEEE 802.15, 1.5-2.0 GHz

D. IEEE 802.15, 2.4-2.5 GHz

Answer: D

Question No: 188 – (Topic 2)

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Samhain

  2. SARA

  3. Snort

  4. Tripwire

Answer: A,C

Question No: 189 – (Topic 2)

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee#39;s computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?

  1. Availability

  2. Integrity

  3. Confidentiality

  4. Authenticity

Answer: C

Question No: 190 – (Topic 2)

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

  1. Console

  2. Sensor

  3. Firewall

  4. Modem

  5. Gateway

Answer: A,B

100% Free Download!
Download Free Demo:GISF Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISF Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE