[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISF Dumps with VCE and PDF 21-30

CollectDumps 2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISF.html

GIAC Information Security Fundamentals

Question No: 21 – (Topic 1)

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

  1. Bandwidth

  2. Load

  3. Delay

  4. Frequency

Answer: D

Question No: 22 – (Topic 1)

Mark is implementing security on his e-commerce site. He wants to ensure that a customer sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?

  1. Packet filtering

  2. Authentication

  3. Firewall

  4. Digital signature

Answer: D

Question No: 23 – (Topic 1)

You work as a Network Administrator for Net World Inc. The company has a TCP/IP-based network.

You have configured an Internet access router on the network. A user complains that he is unable to access a resource on the Web. You know that a bad NAT table entry is causing the issue. You decide to clear all the entries on the table. Which of the following commands will you use?

  1. show ip dhcp binding

  2. ipconfig /flushdns

  3. ipconfig /all

  4. clear ip nat translation *

Answer: D

Question No: 24 – (Topic 1)

You are a Consumer Support Technician. You are helping a user troubleshoot computer- related issues. While troubleshooting the user#39;s computer, you find a malicious program similar to a virus or worm. The program negatively affects the privacy and security of the computer and is capable of damaging the computer. Which of the following alert levels of Windows Defender is set for this program?

  1. Low

  2. High

  3. Severe

  4. Medium

Answer: C

Question No: 25 – (Topic 1)

Which of the following provides a credential that can be used by all Kerberos-enabled servers and applications?

  1. Remote Authentication Dial In User Service (RADIUS)

  2. Internet service provider (ISP)

  3. Network Access Point (NAP)

  4. Key Distribution Center (KDC)

Answer: D

Question No: 26 – (Topic 1)

You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. The messaging organization contains one Hub Transport server, one Client Access server, and two Mailbox servers.

You are planning to deploy an Edge Transport server in your messaging organization to minimize the attack surface. At which of the following locations will you deploy the Edge Transport server?

  1. Active Directory site

  2. Intranet

  3. Behind the inner firewall of an organization

  4. Perimeter network

Answer: D

Question No: 27 – (Topic 1)

You are a Product manager of Marioxiss Inc. Your company management is having a conflict with another company Texasoftg Inc. over an issue of security policies. Your legal advisor has prepared a document that includes the negotiation of views for both the companies. This solution is supposed to be the key for conflict resolution. Which of the following are the forms of conflict resolution that have been employed by the legal advisor?

Each correct answer represents a complete solution. Choose all that apply.

  1. Orientation

  2. Mediation

  3. Negotiation

  4. Arbitration

Answer: B,C,D

Question No: 28 – (Topic 1)

You work as the Senior Project manager in Dotcoiss Inc. Your company has started a software project using configuration management and has completed 70% of it. You need to ensure that the network infrastructure devices and networking standards used in this project are installed in accordance with the requirements of its detailed project design documentation. Which of the following procedures will you employ to accomplish the task?

  1. Physical configuration audit

  2. Configuration control

  3. Functional configuration audit

  4. Configuration identification

Answer: A

Question No: 29 – (Topic 1)

Availability Management allows organizations to sustain the IT service availability to support the business at a justifiable cost. Which of the following elements of Availability Management is used to perform at an agreed level over a period of time?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Maintainability

  2. Resilience

  3. Error control

  4. Recoverability

  5. Reliability

  6. Security

  7. Serviceability

Answer: A,B,D,E,F,G

Question No: 30 – (Topic 1)

Your company is going to add wireless connectivity to the existing LAN. You have concerns about the security of the wireless access and wish to implement encryption. Which of the following would be the best choice for you to use?

  1. WAP

  2. WEP

  3. DES

  4. PKI

Answer: B

100% Free Download!
Download Free Demo:GISF Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISF Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE