[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISF Dumps with VCE and PDF 51-60

CollectDumps 2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISF.html

GIAC Information Security Fundamentals

Question No: 51 – (Topic 1)

Mark work as a Network Administrator for Roadways Travel Inc. The conmpany wants to

implement a strategy for its external employees so that they can connect to Web based applications. What will Mark do to achieve this?

(Click the Exhibit button on the toolbar to see the case study.)

  1. He will install a VPN server in the VLAN, Roadways, and an IIS server in the corporate LAN at the headquarters.

  2. He will install a VPN server in the corporate LAN at the headquarters and an IIS server in the DMZ.

  3. He will install a VPN server in the DMZ and an IIS server in the corporate LAN at the headquarters.

  4. He will install a VPN server in the VLAN, Roadways, and an IIS server in the DMZ.

Answer: C

Question No: 52 – (Topic 1)

Which of the following types of authentications supported by OSPF? Each correct answer represents a complete solution. Choose three.

  1. MD5 authentication

  2. Simple password authentication

  3. Null authentication

  4. Kerberos v5 authentication

Answer: A,B,C

Question No: 53 – (Topic 1)

Which of the following are the differences between routed protocols and routing protocols? Each correct answer represents a complete solution. Choose two.

  1. A routing protocol is configured on an interface and decides the method of packet delivery.

  2. A routing protocol decides the path for a packet through the network.

  3. A routed protocol is configured on an interface and decides how a packet will be delivered.

  4. A routed protocol works on the transport layer of the OSI model.

Answer: B,C

Question No: 54 – (Topic 1)

Which of the following algorithms produce 160-bit hash values? Each correct answer represents a complete solution. Choose two.

  1. MD2

  2. MD5

  3. SHA-1

  4. SHA-0

Answer: C,D

Question No: 55 – (Topic 1)

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

  1. Cyber squatting

  2. Cyber Stalking

  3. Man-in-the-middle attack

  4. Spoofing

Answer: D

Question No: 56 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate layer name.

The Network layer of the OSI model corresponds to the layer of the TCP/IP model.

Answer: Internet

Question No: 57 – (Topic 1)

You switch on your mobile Bluetooth device to transfer data to another Bluetooth device. Which of the following Information assurance pillars ensures that the data transfer is being performed with the targeted authorized Bluetooth device and not with any other or unauthorized device?

  1. Data integrity

  2. Confidentiality

  3. Authentication

  4. Non-repudiation

Answer: C

Question No: 58 – (Topic 1)

The new security policy requires you to encrypt all data transmitted from the laptop computers of sales personnel to the distribution centers. How will you implement the security requirements?

(Click the Exhibit button on the toolbar to see the case study.)

  1. Use 40-bit encryption for Routing and Remote Access Service(RRAS) Server. Use PPTP without packet filtering for VPN.

  2. Use 128-bit encryption for Routing and Remote Access Service(RRAS) Server. Use PPTP without packet filtering for VPN.

  3. Use 128-bit encryption for Routing and Remote Access Service(RRAS) Server. Use PPTP with packet filtering for VPN.

  4. Use 40-bit encryption for the Routing and Remote Access Service(RRAS) Server. Use PPTP with packet filtering for VPN.

Answer: C

Question No: 59 – (Topic 1)

Which of the following statements about asymmetric encryption are true?

Each correct answer represents a complete solution. Choose two.

  1. Asymmetric encryption is faster as compared to symmetric encryption.

  2. Asymmetric encryption uses a public key and a private key pair for data encryption.

  3. In asymmetric encryption, only one key is needed to encrypt and decrypt data.

  4. In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.

Answer: B,D

Question No: 60 – (Topic 1)

Which of the following terms is used for a router that filters traffic before it is passed to the firewall?

  1. Screened host

  2. Demilitarized zone (DMZ)

  3. Honey pot

  4. Bastion host

Answer: A

100% Free Download!
Download Free Demo:GISF Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISF Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE