Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

GISF GIAC Information Security Fundamentals Questions and Answers

Questions 4

You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.

B.

Look at the Web servers logs and normal traffic logging.

C.

Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.

D.

Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.

Buy Now
Questions 5

Under the SMART scheme, the Predictive Failure Analysis Technology is used to determine the failure or crash for which of the following parts of a computer system?

Options:

A.

Operating System

B.

Hard Disc drive

C.

Software

D.

Internet Browser

Buy Now
Questions 6

Which of the following firewalls operates at three layers- Layer3, Layer4, and Layer5?

Options:

A.

Circuit-level firewall

B.

Application layer firewall

C.

Proxy firewall

D.

Dynamic packet-filtering firewall

Buy Now
Questions 7

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He enters a single quote in the input field of the login page of the Weare- secure Web site and receives the following error message:

Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'

This error message shows that the We-are-secure Website is vulnerable to __________.

Options:

A.

A buffer overflow

B.

An XSS attack

C.

A Denial-of-Service attack

D.

A SQL injection attack

Buy Now
Questions 8

The method used to encrypt messages by transposing or scrambling the characters in a certain manner is known as ______.

Options:

A.

Quantum cipher

B.

Transposition cipher

C.

Hybrid systems

D.

Mathematical cipher

E.

Substitution cipher

F.

Steganography

Buy Now
Questions 9

Which of the following types of firewall functions at the Session layer of OSI model?

Options:

A.

Circuit-level firewall

B.

Application-level firewall

C.

Switch-level firewall

D.

Packet filtering firewall

Buy Now
Questions 10

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Packet filtering firewall

B.

Application-level firewall

C.

Stateful inspection firewall

D.

Circuit-level firewall

Buy Now
Questions 11

In packet filtering types of firewalls, which of the following specifies what traffic can and cannot traverse the firewall?

Options:

A.

Internet bot

B.

Access control list

C.

ASDM

D.

RIP

Buy Now
Questions 12

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network.

John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

Options:

A.

Operational audit

B.

Non-operational audit

C.

Independent audit

D.

Dependent audit

Buy Now
Questions 13

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails.

Which of the following will you use to accomplish this?

Options:

A.

NTFS

B.

PPTP

C.

PGP

D.

IPSec

Buy Now
Questions 14

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Authentication

B.

Confidentiality

C.

Integrity

D.

Non-repudiation

Buy Now
Questions 15

You have successfully installed an IRM server into your environment. This IRM server will be utilized to protect the company's videos, which are available to all employees but contain sensitive data. You log on to the WSS 3.0 server with administrator permissions and navigate to the Operations section. What option should you now choose so that you can input the RMS server name for the WSS 3.0 server to use?

Options:

A.

Self-service site management

B.

Content databases

C.

Information Rights Management

D.

Define managed paths

Buy Now
Questions 16

Kelly is the project manager of the NNQ Project for her company. This project will last for one year and has a budget of $350,000. Kelly is working with her project team and subject matter experts to begin the risk response planning process. When the project manager begins the plan risk response process, what two inputs will she need?

Options:

A.

Risk register and the results of risk analysis

B.

Risk register and the risk response plan

C.

Risk register and the risk management plan

D.

Risk register and power to assign risk responses

Buy Now
Questions 17

Which of the following is a remote access protocol that supports encryption?

Options:

A.

PPP

B.

SLIP

C.

UDP

D.

SNMP

Buy Now
Questions 18

You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant. Which algorithm are they most likely using for hashing?

Options:

A.

PKI

B.

MD5

C.

SHA

D.

Kerberos

Buy Now
Questions 19

Based on the information given in the case study, which two authentication methods should you use to allow customers to access their photos on the Web site?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Basic authentication without SSL

B.

Digest authentication with SSL

C.

Integrated Windows authentication

D.

Anonymous access

E.

Basic authentication with SSL

F.

Digest authentication without SSL

Buy Now
Questions 20

The security of a computer against the unauthorized usage largely depends upon the efficiency of the applied access control method. Which of the following statements are true about a computer access control method?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It can be based upon fingerprint or eye recognition.

B.

It can be time-synchronous.

C.

It provides security against the virus attacks.

D.

It provides security against Eavesdropping.

E.

It checks the authenticity of a person.

F.

It is used to encrypt a message before transmitting it on a network.

Buy Now
Questions 21

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer?

Options:

A.

IPLog

B.

Snort

C.

Timbersee

D.

Swatch

Buy Now
Questions 22

Which of the following statements are TRUE regarding asymmetric encryption and symmetric encryption? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Data Encryption Standard (DES) is a symmetric encryption key algorithm.

B.

In symmetric encryption, the secret key is available only to the recipient of the message.

C.

Symmetric encryption is commonly used when a message sender needs to encrypt a large amount of data.

D.

Asymmetric encryption uses a public key and a private key pair for data encryption.

Buy Now
Questions 23

Which of the following statements are true about UDP?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

UDP is an unreliable protocol.

B.

FTP uses a UDP port for communication.

C.

UDP is a connectionless protocol.

D.

TFTP uses a UDP port for communication.

E.

UDP works at the data-link layer of the OSI model.

Buy Now
Questions 24

Which of the following protocols can help you get notified in case a router on a network fails?

Options:

A.

SMTP

B.

SNMP

C.

TCP

D.

ARP

Buy Now
Questions 25

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

Options:

A.

Denial-of-Service

B.

Eavesdropping

C.

Spoofing

D.

Packet manipulation

Buy Now
Questions 26

You switch on your mobile Bluetooth device to transfer data to another Bluetooth device. Which of the following Information assurance pillars ensures that the data transfer is being performed with the targeted authorized Bluetooth device and not with any other or unauthorized device?

Options:

A.

Data integrity

B.

Confidentiality

C.

Authentication

D.

Non-repudiation

Buy Now
Questions 27

You work in an enterprise as a Network Engineer. Your enterprise has a secure internal network.

You want to apply an additional network packet filtering device that is intermediate to your enterprise's internal network and the outer network (internet). Which of the following network zones will you create to accomplish this task?

Options:

A.

Autonomous system area (AS)

B.

Demilitarized zone (DMZ)

C.

Border network area

D.

Site network area

Buy Now
Questions 28

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:

A.

Risk acceptance

B.

Risk transfer

C.

Risk avoidance

D.

Risk mitigation

Buy Now
Questions 29

Andrew works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains five Windows 2008 member servers and 120 Windows XP Professional client computers. Andrew is concerned about the member servers that are not meeting the security requirements as mentioned in the security policy of the company. Andrew wants to compare the current security settings of the member servers with the security template that is configured according to the security policy of the company. Which of the following tools will Andrew use to accomplish this?

Options:

A.

Security Configuration and Analysis Tool

B.

Active Directory Migration Tool (ADMT)

C.

Task Manager

D.

Group Policy Management Console (GPMC)

Buy Now
Questions 30

Which of the following types of attack can guess a hashed password?

Options:

A.

Teardrop attack

B.

Evasion attack

C.

Denial of Service attack

D.

Brute force attack

Buy Now
Questions 31

The IT Director of the company is very concerned about the security of the network. Which audit policy should he implement to detect possible intrusions into the network? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

The success and failure auditing for policy change.

B.

The success and failure auditing for process tracking.

C.

The success and failure auditing for logon events.

D.

The success and failure auditing for privilege use.

Buy Now
Questions 32

You are the project manager for BlueWell Inc. You are reviewing the risk register for your project. The risk register provides much information to you, the project manager and to the project team during the risk response planning. All of the following are included in the risk register except for which item?

Options:

A.

Trends in qualitative risk analysis results

B.

Symptoms and warning signs of risks

C.

List of potential risk responses

D.

Network diagram analysis of critical path activities

Buy Now
Questions 33

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WPA with 802.1X authentication

B.

WPA with Pre Shared Key

C.

WPA

D.

WEP

Buy Now
Questions 34

Rick works as a Network Administrator for Fimbry Hardware Inc. Based on the case study, which network routing strategy will he implement for the company? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

He will implement OSPF on all the router interfaces.

B.

He will implement RIP v1 on all the router interfaces.

C.

He will implement the IGMP on all the router interface.

D.

He will implement RIP v2 on all the router interfaces.

E.

He will implement static routes for the routers.

Buy Now
Questions 35

You work as a Software Developer for uCertify Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:

A.

Cryptographer

B.

Cryptographic toolkit

C.

Cryptosystem

D.

Cryptanalyst

Buy Now
Questions 36

Which of the following logs contains events pertaining to security as defined in the Audit policy?

Options:

A.

DNS server log

B.

Application log

C.

System log

D.

Directory Service log

E.

Security log

F.

File Replication Service log

Buy Now
Questions 37

Which of the following devices or hardware parts employs SMART model system as a monitoring system?

Options:

A.

Modem

B.

RAM

C.

Hard disk

D.

IDS

Buy Now
Questions 38

Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?

Options:

A.

Firewall

B.

Automatic Updating

C.

Other Security Settings

D.

Malware Protection

Buy Now
Questions 39

Which of the following protocols is used to prevent switching loops in networks with redundant switched paths?

Options:

A.

Cisco Discovery Protocol (CDP)

B.

Spanning Tree Protocol (STP)

C.

File Transfer Protocol (FTP)

D.

VLAN Trunking Protocol (VTP)

Buy Now
Questions 40

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?

1. To account for all IT assets

2. To provide precise information support to other ITIL disciplines

3. To provide a solid base only for Incident and Problem Management

4. To verify configuration records and correct any exceptions

Options:

A.

2 and 4 only

B.

1, 3, and 4 only

C.

1, 2, and 4 only

D.

2, 3, and 4 only

Buy Now
Questions 41

Bluetooth uses the _________ specification in the ________ band with FHSS technology.

Options:

A.

IEEE 802.11, 2.4-2.5 GHz

B.

IEEE 802.11, 1.4-2.5 GHz

C.

IEEE 802.15, 1.5-2.0 GHz

D.

IEEE 802.15, 2.4-2.5 GHz

Buy Now
Questions 42

Firekiller 2000 is an example of a __________.

Options:

A.

DoS attack Trojan

B.

Data sending Trojan

C.

Remote access Trojan

D.

Security software disabler Trojan

Buy Now
Questions 43

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

Options:

A.

Antivirus

B.

Backup

C.

Symmetric encryption

D.

Firewall

Buy Now
Questions 44

Which of the following statements about a brute force attack is true?

Options:

A.

It is a program that allows access to a computer without using security checks.

B.

It is an attack in which someone accesses your e-mail server and sends misleading information to others.

C.

It is a virus that attacks the hard drive of a computer.

D.

It is a type of spoofing attack.

E.

It is an attempt by an attacker to guess passwords until he succeeds.

Buy Now
Questions 45

You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?

Options:

A.

Network Based

B.

Dictionary

C.

Heuristic

D.

Host based

Buy Now
Questions 46

Which of the following are the types of Intrusion detection system?

Options:

A.

Server-based intrusion detection system (SIDS)

B.

Client based intrusion detection system (CIDS)

C.

Host-based intrusion detection system (HIDS)

D.

Network intrusion detection system (NIDS)

Buy Now
Questions 47

Which of the following is used in asymmetric encryption?

Options:

A.

Public key and user key

B.

Public key and private key

C.

SSL

D.

NTFS

Buy Now
Questions 48

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

Options:

A.

Data encrypted with the secret key can only be decrypted by another secret key.

B.

The secret key can encrypt a message, and anyone with the public key can decrypt it.

C.

Data encrypted by the public key can only be decrypted by the secret key.

D.

The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

Buy Now
Questions 49

You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?

Options:

A.

Risk Management Plan

B.

Communications Management Plan

C.

Stakeholder management strategy

D.

Resource Management Plan

Buy Now
Exam Code: GISF
Exam Name: GIAC Information Security Fundamentals
Last Update: Jun 30, 2025
Questions: 333

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now GISF testing engine

PDF (Q&A)

$31.5  $104.99
buy now GISF pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 05 Jul 2025