[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GISF Dumps with VCE and PDF 91-100

CollectDumps 2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GISF.html

GIAC Information Security Fundamentals

Question No: 91 – (Topic 1)

What does Wireless Transport Layer Security (WTLS) provide for wireless devices? Each correct answer represents a complete solution. Choose all that apply.

  1. Data integrity

  2. Authentication

  3. Encryption

  4. Bandwidth

Answer: A,B,C

Question No: 92 – (Topic 1)

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

  1. Quantitative analysis

  2. Qualitative analysis

  3. Estimate activity duration

  4. Risk identification

Answer: B

Question No: 93 – (Topic 1)

Which of the following statements about testing are true?

Each correct answer represents a complete solution. Choose all that apply.

  1. A stub is a program that simulates a calling unit, and a driver is a program that simulates a called unit.

  2. In unit testing, each independent unit of an application is tested separately.

  3. In integration testing, a developer combines two units that have already been tested into a component.

  4. The bottom-up approach to integration testing helps minimize the need for stubs.

Answer: B,C,D

Question No: 94 – (Topic 1)

Which of the following protocols is used to provide remote monitoring and administration to network management machines on the network? The management machines will use this protocol to collect information for network monitoring. At times, the protocol can also be used for remote configuration.

  1. NNTP

  2. Telnet

  3. SSH

  4. SNMP

Answer: D

Question No: 95 – (Topic 1)

In which type of access control do user ID and password system come under?

  1. Physical

  2. Power

  3. Technical

  4. Administrative

Answer: C

Question No: 96 – (Topic 1)

You are the project manager of a new project in your organization. You and the project team have identified the project risks, completed risk analysis, and are planning the most appropriate risk responses. Which of the following tools is most effective to choose the most appropriate risk response?

  1. Project network diagrams

  2. Delphi Technique

  3. Decision tree analysis

  4. Cause-and-effect diagrams

Answer: C

Question No: 97 – (Topic 1)

Which of the following protocols work at the Network layer of the OSI model?

  1. Internet Group Management Protocol (IGMP)

  2. Simple Network Management Protocol (SNMP)

  3. Routing Information Protocol (RIP)

  4. File Transfer Protocol (FTP)

Answer: A,C

Question No: 98 – (Topic 1)

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

  1. The Configuration Manager

  2. The Supplier Manager

  3. The IT Service Continuity Manager

  4. The Service Catalogue Manager

Answer: B

Question No: 99 – (Topic 1)

Andrew works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains five Windows 2008 member servers and 120 Windows XP Professional client computers. Andrew is concerned about the member servers that are not meeting the security requirements as mentioned in the security policy of the company. Andrew wants to compare the current security settings of the member servers with the security template that is configured according to the security policy of the company. Which of the following tools will Andrew use to accomplish this?

  1. Security Configuration and Analysis Tool

  2. Active Directory Migration Tool (ADMT)

  3. Task Manager

  4. Group Policy Management Console (GPMC)

Answer: A

Question No: 100 – (Topic 1)

Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?

  1. S/MIME

  2. PGP

  3. Asymmetric encryption

  4. Symmetric encryption

Answer: D

100% Free Download!
Download Free Demo:GISF Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GISF Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE