[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISF Dumps with VCE and PDF 31-40

CollectDumps 2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISF.html

GIAC Information Security Fundamentals

Question No: 31 – (Topic 1)

Which of the following tools can be used to perform tasks such as Windows password cracking Windows enumeration, and VoIP session sniffing?

  1. John the Ripper

  2. Obiwan

  3. Cain

  4. L0phtcrack

Answer: C

Question No: 32 – (Topic 1)

Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?

  1. NetBus

  2. EliteWrap

  3. Trojan Man

  4. Tiny

Answer: C

Question No: 33 – (Topic 1)

What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

  1. The application layer port numbers and the transport layer headers

  2. The presentation layer headers and the session layer port numbers

  3. The network layer headers and the session layer port numbers

  4. The transport layer port numbers and the application layer headers

Answer: D

Question No: 34 – (Topic 1)

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

  1. Install a DMZ firewall

  2. Enable verbose logging on the firewall

  3. Install a host-based IDS

  4. Install a network-based IDS

Answer: D

Question No: 35 – (Topic 1)

The SALES folder has a file named XFILE.DOC that contains critical information about your company. This folder resides on an NTFS volume. The company#39;s Senior Sales Manager asks you to provide security for that file. You make a backup of that file and keep it in a locked cupboard, and then you deny access on the file for the Sales group. John, a

member of the Sales group, accidentally deletes that file. You have verified that John is not a member of any other group.

Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file.

What is the most likely cause?

  1. The Sales group has the Full Control permission on the SALES folder.

  2. The Deny Access permission does not work on files.

  3. The Deny Access permission does not restrict the deletion of files.

  4. John is a member of another group having the Full Control permission on that file.

Answer: A

Question No: 36 – (Topic 1)

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want to the information security policies.

Which of the following are its significant steps?

Each correct answer represents a complete solution. Choose two.

  1. Awareness and Training Material Effectiveness

  2. Awareness and Training Material Development

  3. Awareness and Training Material Implementation

  4. Awareness and Training Program Design

Answer: B,D

Question No: 37 – (Topic 1)

You are the project manager of the HHH Project. The stakeholders for this project are scattered across the world and you need a method to promote interaction. You determine that a Web conferencing software would be the most cost effective solution. The stakeholders can watch a slide show while you walk them through the project details. The stakeholders can hear you, ask questions via a chat software, and post concerns. What is

the danger in this presentation?

  1. 55 percent of all communication is nonverbal and this approach does not provide non- verbal communications.

  2. The technology is not proven as reliable.

  3. The stakeholders won#39;t really see you.

  4. The stakeholders are not required to attend the entire session.

Answer: A

Question No: 38 – (Topic 1)

A Cisco Unified Wireless Network has an AP that does not rely on the central control device of the network. Which type of AP has this characteristic?

  1. Lightweight AP

  2. Rogue AP

  3. LWAPP

  4. Autonomous AP

Answer: D

Question No: 39 – (Topic 1)

Which of the following monitors program activities and modifies malicious activities on a system?

  1. Back door

  2. HIDS

  3. RADIUS

  4. NIDS

Answer: B

Question No: 40 – (Topic 1)

Which of the following statements is not true about a digital certificate?

  1. It is used with both public key encryption and private key encryption.

  2. It is used with private key encryption.

  3. It is neither used with public key encryption nor with private key encryption.

  4. It is used with public key encryption.

Answer: D

100% Free Download!
Download Free Demo:GISF Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISF Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE