[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISF Dumps with VCE and PDF 71-80

CollectDumps 2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISF.html

GIAC Information Security Fundamentals

Question No: 71 – (Topic 1)

You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?

  1. Use Incident handling

  2. Use OODA loop

  3. Use Information assurance

  4. Use SMART model.

Answer: D

Question No: 72 – (Topic 1)

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

  1. Containment

  2. Preparation

  3. Recovery

  4. Identification

Answer: A

Question No: 73 – (Topic 1)

You are the security manager of Microliss Inc. Your enterprise uses a wireless network

infrastructure with access points ranging 150-350 feet. The employees using the network complain that their passwords and important official information have been traced. You discover the following clues:

The information has proved beneficial to another company.

The other company is located about 340 feet away from your office. The other company is also using wireless network.

The bandwidth of your network has degraded to a great extent. Which of the following methods of attack has been used?

  1. A piggybacking attack has been performed.

  2. The information is traced using Bluebugging.

  3. A DOS attack has been performed.

  4. A worm has exported the information.

Answer: A

Question No: 74 – (Topic 1)

Which of the following options cannot be accessed from Windows Update?

  1. Restore Hidden Updates

  2. Check for Updates

  3. View Update History

  4. View AntiVirus Software Update

Answer: D

Question No: 75 – (Topic 1)

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise#39;s network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

  1. Denial-of-Service

  2. Eavesdropping

  3. Spoofing

  4. Packet manipulation

Answer: A

Question No: 76 – (Topic 1)

John works as a security manager in Mariotx.Inc. He has been tasked to resolve a network attack issue. To solve the problem, he first examines the critical information about the attacker#39;s interaction to the network environment. He prepares a past record and behavioral document of the attack to find a direction of the solution. Then he decides to perform an action based on the previous hypothesis and takes the appropriate action against the attack. Which of the following strategies has John followed?

  1. Maneuver warfare

  2. Control theory

  3. SWOT Analysis

  4. OODA loop

Answer: D

Question No: 77 – (Topic 1)

Which of the following service provider classes is used to create a digital signature?

  1. RC2CryptoServiceProvider

  2. RNGCryptoServiceProvider

  3. DESCryptoServiceProvider

  4. SHA1CryptoServiceProvider

  5. MD5CryptoServiceProvider

  6. DSACryptoServiceProvider

Answer: F

Question No: 78 – (Topic 1)

Which of the following is a pillar of Information Assurance CIA triad?

  1. Integrity

  2. Affiliation

  3. Accessibility

  4. Isolation

Answer: A

Question No: 79 – (Topic 1)

Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?

Each correct answer represents a complete solution. Choose all that apply.

  1. Forward a copy of the spam to the ISP to make the ISP conscious of the spam.

  2. Send an email to the domain administrator responsible for the initiating IP address.

  3. Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.

  4. Close existing email account and open new email account.

Answer: A,C

Question No: 80 – (Topic 1)

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

  1. Risk analysis

  2. Firewall security

  3. OODA loop

  4. Cryptography

Answer: D

100% Free Download!
Download Free Demo:GISF Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISF Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE