Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

GIAC Information Security Fundamentals Question and Answers

GIAC Information Security Fundamentals

Last Update May 18, 2024
Total Questions : 333

We are offering FREE GISF GIAC exam questions. All you do is to just go and sign up. Give your details, prepare GISF free exam questions and then go for complete pool of GIAC Information Security Fundamentals test questions that will help you more.

GISF pdf

GISF PDF

$35  $99.99
GISF Engine

GISF Testing Engine

$42  $119.99
GISF PDF + Engine

GISF PDF + Testing Engine

$56  $159.99
Questions 1

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

Options:

A.  

Sending deceptive e-mails

B.  

Sending notifications

C.  

Shunning

D.  

Logging

E.  

Spoofing

F.  

Network Configuration Changes

Discussion 0
Questions 2

Which of the following is used in asymmetric encryption?

Options:

A.  

Public key and user key

B.  

Public key and private key

C.  

SSL

D.  

NTFS

Discussion 0
Questions 3

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

Options:

A.  

Antivirus log

B.  

System log

C.  

IDS log

D.  

Firewall log

Discussion 0
Questions 4

Fred is the project manager for the TCC Company. His company has an internal policy that states each year they will provide free services to a nonprofit organization. Therefore, the company and its employees are not allowed to charge or receive money or gifts from the nonprofit organization they choose to provide free services. This year, the TCC Company offers to provide project management services to the children's hospital for a marketing campaign to raise money. Due to the TCC Company's project management services, the nonprofit agency exceeded previous years fund raising efforts. To show appreciation the nonprofit organization offered to reimburse the project manager for his travel expenses. Which of the following best describes how the project manager should handle the situation?

Options:

A.  

Say thank you and let them pay for the travel, it is the least they can do.

B.  

Tell the hospital no thank you and explain it is against company policy to accept payment for services provided to their pro bono customers.

C.  

Say nothing as to not hurt the feelings of the children's hospital.

D.  

Ask if the hospital could pay for some of the supplies too.

Discussion 0
Questions 5

You are the project manager for a software technology company. You and the project team have identified that the executive staff is not fully committed to the project. Which of the following best describes the risk?

Options:

A.  

Residual risks

B.  

Trend analysis

C.  

Schedule control

D.  

Organizational risks

Discussion 0
Questions 6

Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

Options:

A.  

Teardrop attack

B.  

SYN flood attack

C.  

Ping of Death attack

D.  

DDoS attack

Discussion 0
Questions 7

What is VeriSign?

Options:

A.  

It is a data warehouse.

B.  

It is an e-commerce portal.

C.  

It is a search engine.

D.  

It is a payment gateway.

Discussion 0
Questions 8

You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

Options:

A.  

Vertical Privilege Escalation

B.  

Session Hijacking

C.  

Account hijacking

D.  

Horizontal Privilege Escalation

Discussion 0
Questions 9

Which of the following devices or hardware parts employs SMART model system as a monitoring system?

Options:

A.  

Modem

B.  

RAM

C.  

Hard disk

D.  

IDS

Discussion 0
Questions 10

Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?

Options:

A.  

Firewall

B.  

Automatic Updating

C.  

Other Security Settings

D.  

Malware Protection

Discussion 0
Questions 11

You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

Options:

A.  

FTP

B.  

Gopher

C.  

Firewall

D.  

HTTP

Discussion 0
Questions 12

Which of the following statements about a brute force attack is true?

Options:

A.  

It is a program that allows access to a computer without using security checks.

B.  

It is an attack in which someone accesses your e-mail server and sends misleading information to others.

C.  

It is a virus that attacks the hard drive of a computer.

D.  

It is a type of spoofing attack.

E.  

It is an attempt by an attacker to guess passwords until he succeeds.

Discussion 0
Questions 13

The IT Director of the company is very concerned about the security of the network. Which audit policy should he implement to detect possible intrusions into the network? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.  

The success and failure auditing for policy change.

B.  

The success and failure auditing for process tracking.

C.  

The success and failure auditing for logon events.

D.  

The success and failure auditing for privilege use.

Discussion 0
Questions 14

Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Maintaining cordial relationship with project sponsors

B.  

Reporting your project management appearance

C.  

Staying up-to-date with project management practices

D.  

Staying up-to-date with latest industry trends and new technology

Discussion 0
Questions 15

Rick works as a Network Administrator for Fimbry Hardware Inc. Based on the case study, which network routing strategy will he implement for the company? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.  

He will implement OSPF on all the router interfaces.

B.  

He will implement RIP v1 on all the router interfaces.

C.  

He will implement the IGMP on all the router interface.

D.  

He will implement RIP v2 on all the router interfaces.

E.  

He will implement static routes for the routers.

Discussion 0
Questions 16

Which of the following protocols implements VPN using IPSec?

Options:

A.  

SLIP

B.  

PPTP

C.  

PPP

D.  

L2TP

Discussion 0
Questions 17

You have been tasked with finding an encryption methodology for your company's network. The solution must use public key encryption which is keyed to the users email address. Which of the following should you select?

Options:

A.  

AES

B.  

3DES

C.  

PGP

D.  

Blowfish

Discussion 0
Questions 18

Web applications play a vital role in deploying different databases with user accessibility on the Internet. Which of the following allows an attacker to get unauthorized access to the database of a Web application by sending (attacking) user-supplied data to an interpreter as part of a command or query?

Options:

A.  

Cross Site Scripting

B.  

Injection flaw

C.  

Cross Site Request Forgery (CSRF)

D.  

Malicious File Execution

Discussion 0
Questions 19

Which of the following authentication methods uses MD5 hash encoding while transferring credentials over a network?

Options:

A.  

.NET Passport authentication

B.  

Advanced Digest authentication

C.  

Integrated Windows authentication

D.  

Digest authentication

Discussion 0
Questions 20

At which OSI layer does UDP operate?

Options:

A.  

Network layer

B.  

Data-link layer

C.  

Session layer

D.  

Transport layer

E.  

Presentation layer

Discussion 0
Questions 21

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Transposition cipher

B.  

Message Authentication Code

C.  

Stream cipher

D.  

Block cipher

Discussion 0
Questions 22

A company would like your consulting firm to review its current network and suggest changes that will increase its efficiency and optimize the business processes.

To design such a network, you prepare a case study.

Which of the following policies should be implemented through a group policy that is associated with the netperfect.com domain?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Account lockout policy.

B.  

Password policy.

C.  

Limit computers that can access production schedule software.

D.  

Assign MS Office suite to appropriate users.

Discussion 0
Questions 23

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.  

Packet filter firewall

B.  

Proxy-based firewall

C.  

Stateful firewall

D.  

Endian firew

Discussion 0
Questions 24

Which term best describes an e-mail that contains incorrect and misleading information or warnings about viruses?

Options:

A.  

Blowfish

B.  

Spam

C.  

Virus

D.  

Trojan horse

E.  

Hoax

F.  

Rlogin

Discussion 0
Questions 25

You work as a Product manager for Marioiss Inc. You have been tasked to start a project for securing the network of your company. You want to employ configuration management to efficiently manage the procedures of the project. What will be the benefits of employing configuration management for completing this project?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

It provides the risk analysis of project configurations.

B.  

It provides object, orient, decide and act strategy.

C.  

It provides the versions for network devices.

D.  

It provides a live documentation of the project.

Discussion 0
Questions 26

Which of the following is the best approach to conflict resolution?

Options:

A.  

Hard work and understanding

B.  

Mutual respect and cooperation

C.  

Flexibility

D.  

Sincerity and hard work

Discussion 0
Questions 27

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.  

TCP FTP proxy scanning

B.  

Eavesdropping

C.  

Fingerprinting

D.  

Web ripping

Discussion 0
Questions 28

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Options:

A.  

S/MIME

B.  

Asymmetric

C.  

PGP

D.  

Symmetric

Discussion 0
Questions 29

Mark is implementing security on his e-commerce site. He wants to ensure that a customer sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?

Options:

A.  

Authentication

B.  

Firewall

C.  

Packet filtering

D.  

Digital signature

Discussion 0
Questions 30

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Cookies folder

B.  

Temporary Internet Folder

C.  

Download folder

D.  

History folder

Discussion 0
Questions 31

Which two security components should you implement on the sales personnel portable computers to increase security?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Remote access policy

B.  

L2TP over IPSec

C.  

PPTP

D.  

Remote Authentication Dial-In User Service (RADIUS)

E.  

Encrypting File System (EFS)

Discussion 0
Questions 32

Which of the following statements about Public Key Infrastructure (PKI) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

It is a digital representation of information that identifies users.

B.  

It uses asymmetric key pairs.

C.  

It provides security using data encryption and digital signature.

D.  

It uses symmetric key pairs.

Discussion 0
Questions 33

Which of the following types of virus is capable of changing its signature to avoid detection?

Options:

A.  

Stealth virus

B.  

Boot sector virus

C.  

Macro virus

D.  

Polymorphic virus

Discussion 0
Questions 34

Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?

Options:

A.  

S/MIME

B.  

PGP

C.  

Asymmetric encryption

D.  

Symmetric encryption

Discussion 0
Questions 35

Which of the following types of attacks cannot be prevented by technical measures only?

Options:

A.  

Social engineering

B.  

Smurf DoS

C.  

Brute force

D.  

Ping flood attack

Discussion 0
Questions 36

Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?

Options:

A.  

NetBus

B.  

EliteWrap

C.  

Trojan Man

D.  

Tiny

Discussion 0
Questions 37

Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?

Options:

A.  

American Bankers Association

B.  

Central Security Service (CSS)

C.  

National Institute of Standards and Technology (NIST)

D.  

International Telecommunications Union

E.  

Request for Comments (RFC)

F.  

National Security Agency (NSA)

Discussion 0
Questions 38

You work as a Network Administrator for ABC Inc. The company has a secure wireless network.

However, in the last few days, an attack has been taking place over and over again. This attack is taking advantage of ICMP directed broadcast. To stop this attack, you need to disable ICMP directed broadcasts. Which of the following attacks is taking place?

Options:

A.  

Smurf attack

B.  

Sniffer attack

C.  

Cryptographic attack

D.  

FMS attack

Discussion 0
Questions 39

You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?

Options:

A.  

A risk probability-impact matrix

B.  

Quantitative risk analysis

C.  

Qualitative risk analysis

D.  

Seven risk responses

Discussion 0
Questions 40

Which of the following algorithms produce 160-bit hash values?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

MD2

B.  

MD5

C.  

SHA-1

D.  

SHA-0

Discussion 0
Questions 41

You are the project manager of the HHH Project. The stakeholders for this project are scattered across the world and you need a method to promote interaction. You determine that a Web conferencing software would be the most cost effective solution. The stakeholders can watch a slide show while you walk them through the project details. The stakeholders can hear you, ask questions via a chat software, and post concerns. What is the danger in this presentation?

Options:

A.  

55 percent of all communication is nonverbal and this approach does not provide non-verbal communications.

B.  

The technology is not proven as reliable.

C.  

The stakeholders won't really see you.

D.  

The stakeholders are not required to attend the entire session.

Discussion 0
Questions 42

Which of the following statements about digital signature is true?

Options:

A.  

Digital signature is required for an e-mail message to get through a firewall.

B.  

Digital signature verifies the identity of the person who applies it to a document.

C.  

Digital signature decrypts the contents of documents.

D.  

Digital signature compresses the message to which it is applied.

Discussion 0
Questions 43

Which of the following terms is used for a router that filters traffic before it is passed to the firewall?

Options:

A.  

Screened host

B.  

Demilitarized zone (DMZ)

C.  

Honey pot

D.  

Bastion host

Discussion 0
Questions 44

Which of the following protocols are used by Network Attached Storage (NAS)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Apple Filing Protocol (AFP)

B.  

Server Message Block (SMB)

C.  

Network File System (NFS)

D.  

Distributed file system (Dfs)

Discussion 0
Questions 45

Kelly is the project manager of the NNQ Project for her company. This project will last for one year and has a budget of $350,000. Kelly is working with her project team and subject matter experts to begin the risk response planning process. When the project manager begins the plan risk response process, what two inputs will she need?

Options:

A.  

Risk register and the results of risk analysis

B.  

Risk register and the risk response plan

C.  

Risk register and the risk management plan

D.  

Risk register and power to assign risk responses

Discussion 0
Questions 46

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host?

Options:

A.  

Blackbox testing

B.  

Firewalking

C.  

Brainstorming

D.  

Port redirection

Discussion 0
Questions 47

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:

A.  

IPChains

B.  

OpenSSH

C.  

Stunnel

D.  

IPTables

Discussion 0
Questions 48

You are the security manager of Microliss Inc. Your enterprise uses a wireless network infrastructure with access points ranging 150-350 feet. The employees using the network complain that their passwords and important official information have been traced. You discover the following clues:

The information has proved beneficial to another company.

The other company is located about 340 feet away from your office.

The other company is also using wireless network.

The bandwidth of your network has degraded to a great extent.

Which of the following methods of attack has been used?

Options:

A.  

A piggybacking attack has been performed.

B.  

The information is traced using Bluebugging.

C.  

A DOS attack has been performed.

D.  

A worm has exported the information.

Discussion 0
Questions 49

Which of the following factors determine the strength of the encryption?

Options:

A.  

Character-set encoding

B.  

Length of the key

C.  

Operating system

D.  

Ease of use

Discussion 0