GIAC GISF Exam Practice Questions (P. 3)
- Full Access (316 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
You work as a Network Administrator for Net World Inc. The company has a TCP/IP-based network.
You have configured an Internet access router on the network. A user complains that he is unable to access a resource on the Web. You know that a bad NAT table entry is causing the issue. You decide to clear all the entries on the table. Which of the following commands will you use?
You have configured an Internet access router on the network. A user complains that he is unable to access a resource on the Web. You know that a bad NAT table entry is causing the issue. You decide to clear all the entries on the table. Which of the following commands will you use?
- Ashow ip dhcp binding
- Bipconfig /flushdns
- Cipconfig /all
- Dclear ip nat translation *
Correct Answer:
D
D
send
light_mode
delete
Question #22
You are a Consumer Support Technician. You are helping a user troubleshoot computer-related issues. While troubleshooting the user's computer, you find a malicious program similar to a virus or worm. The program negatively affects the privacy and security of the computer and is capable of damaging the computer. Which of the following alert levels of Windows Defender is set for this program?
send
light_mode
delete
Question #23
Which of the following provides a credential that can be used by all Kerberos-enabled servers and applications?
- ARemote Authentication Dial In User Service (RADIUS)
- BInternet service provider (ISP)
- CNetwork Access Point (NAP)
- DKey Distribution Center (KDC)
Correct Answer:
D
D
send
light_mode
delete
Question #24
You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. The messaging organization contains one Hub Transport server, one Client Access server, and two Mailbox servers.
You are planning to deploy an Edge Transport server in your messaging organization to minimize the attack surface. At which of the following locations will you deploy the Edge Transport server?
You are planning to deploy an Edge Transport server in your messaging organization to minimize the attack surface. At which of the following locations will you deploy the Edge Transport server?
- AActive Directory site
- BIntranet
- CBehind the inner firewall of an organization
- DPerimeter network
Correct Answer:
D
D
send
light_mode
delete
Question #25
You are a Product manager of Marioxiss Inc. Your company management is having a conflict with another company Texasoftg Inc. over an issue of security policies. Your legal advisor has prepared a document that includes the negotiation of views for both the companies. This solution is supposed to be the key for conflict resolution. Which of the following are the forms of conflict resolution that have been employed by the legal advisor?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
send
light_mode
delete
Question #26
You work as the Senior Project manager in Dotcoiss Inc. Your company has started a software project using configuration management and has completed 70% of it. You need to ensure that the network infrastructure devices and networking standards used in this project are installed in accordance with the requirements of its detailed project design documentation. Which of the following procedures will you employ to accomplish the task?
- APhysical configuration audit
- BConfiguration control
- CFunctional configuration audit
- DConfiguration identification
Correct Answer:
A
A
send
light_mode
delete
Question #27
Availability Management allows organizations to sustain the IT service availability to support the business at a justifiable cost. Which of the following elements of Availability Management is used to perform at an agreed level over a period of time?
Each correct answer represents a part of the solution. Choose all that apply.
Each correct answer represents a part of the solution. Choose all that apply.
- AMaintainability
- BResilience
- CError control
- DRecoverability
- EReliability
- FSecurity
- GServiceability
Correct Answer:
ABDEFG
ABDEFG
send
light_mode
delete
Question #28
Your company is going to add wireless connectivity to the existing LAN. You have concerns about the security of the wireless access and wish to implement encryption. Which of the following would be the best choice for you to use?
send
light_mode
delete
Question #29
Which of the following tools can be used to perform tasks such as Windows password cracking Windows enumeration, and VoIP session sniffing?
send
light_mode
delete
Question #30
Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?
send
light_mode
delete
All Pages