[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISF Dumps with VCE and PDF 191-200

CollectDumps 2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISF.html

GIAC Information Security Fundamentals

Question No: 191 – (Topic 2)

You work as a Security manager for Orangesect Inc. The enterprise is using the OODA loop strategy to counter the security issues in the enterprise. Some of the IP addresses of the enterprise have been hacked. You match up the present hacking issue and condition with the past hacking experiences to find a solution. Which of the following phases of the OODA loop involves the procedure followed by you?

  1. The decide phase

  2. The orient phase

  3. The observe phase

  4. The act phase

Answer: B

Question No: 192 – (Topic 2)

Which of the following refers to a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens?

  1. Man-trap

  2. Man-in-the-middle

  3. Demilitarized zone (DMZ)

  4. Firewall

Answer: A

Question No: 193 – (Topic 2)

You have been tasked with finding an encryption methodology for your company#39;s network. The solution must use public key encryption which is keyed to the users email address.

Which of the following should you select?

  1. AES

  2. 3DES

  3. PGP

  4. Blowfish

Answer: C

Question No: 194 – (Topic 2)

Which of the following statements are true about TCP/IP model?

Each correct answer represents a complete solution. Choose all that apply.

  1. It is consists of various protocols present in each layer.

  2. It describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network.

  3. It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.

  4. It is generally described as having five abstraction layers.

Answer: A,B,C

Question No: 195 – (Topic 2)

Which of the following are used as primary technologies to create a layered defense for giving protection to a network?

Each correct answer represents a complete solution. Choose all that apply.

  1. Vulnerability

  2. Firewall

  3. Endpoint authentication

  4. IDS

Answer: B,C,D

Question No: 196 – (Topic 2)

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook#39;s preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

  1. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

  2. HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = quot;file and pathname of the WAB filequot;

  3. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

  4. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

Answer: B

Question No: 197 – (Topic 2)

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.

The tool uses raw IP packets to determine the following:

What ports are open on our network systems. What hosts are available on the network.

Identify unauthorized wireless access points.

What services (application name and version) those hosts are offering. What operating systems (and OS versions) they are running.

What type of packet filters/firewalls are in use. Which of the following tools is Victor using?

  1. Nessus

  2. Kismet

  3. Nmap

  4. Sniffer

Answer: C

Question No: 198 – (Topic 2)

Which of the following statements are true about security risks? Each correct answer represents a complete solution. Choose three.

  1. They are considered an indicator of threats coupled with vulnerability.

  2. They can be mitigated by reviewing and taking responsible actions based on possible risks.

  3. They can be removed completely by taking proper actions.

  4. They can be analyzed and measured by the risk analysis process.

    Answer: A,B,D

    Question No: 199 – (Topic 2)

    Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?

    1. To account for all IT assets

    2. To provide precise information support to other ITIL disciplines

    3. To provide a solid base only for Incident and Problem Management

    4. To verify configuration records and correct any exceptions

      1. 2 and 4 only

      2. 1, 3, and 4 only

      3. 1, 2, and 4 only

      4. 2, 3, and 4 only

Answer: C

Question No: 200 – (Topic 2)

You work as a Network Administrator for Tech World Inc. The company has a TCP/IP- based router. You have configured a router on your network. You want to accomplish the following goals:

l Configure the router to require a password to move from user EXEC mode to privileged EXEC mode.

l The password must be listed as a hidden entry in the configuration file.

You run the following command: enable password lt;passwordgt; Which of the goals will this action accomplish?

  1. The password will be listed as a hidden entry in the configuration file

  2. The action will accomplish neither of the goals

  3. The action will accomplish both the goals

  4. The router will require a password to move from user EXEC mode to privileged EXEC mode

Answer: D

100% Free Download!
Download Free Demo:GISF Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISF Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE