GIAC GISF Exam Practice Questions (P. 4)
- Full Access (316 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #31
What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?
- AThe application layer port numbers and the transport layer headers
- BThe presentation layer headers and the session layer port numbers
- CThe network layer headers and the session layer port numbers
- DThe transport layer port numbers and the application layer headers
Correct Answer:
D
D
send
light_mode
delete
Question #32
You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?
- AInstall a DMZ firewall
- BEnable verbose logging on the firewall
- CInstall a host-based IDS
- DInstall a network-based IDS
Correct Answer:
D
D
send
light_mode
delete
Question #33
The SALES folder has a file named XFILE.DOC that contains critical information about your company. This folder resides on an NTFS volume. The company's Senior Sales Manager asks you to provide security for that file. You make a backup of that file and keep it in a locked cupboard, and then you deny access on the file for the Sales group. John, a member of the Sales group, accidentally deletes that file. You have verified that John is not a member of any other group.
Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file.
What is the most likely cause?
Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file.
What is the most likely cause?
- AThe Sales group has the Full Control permission on the SALES folder.
- BThe Deny Access permission does not work on files.
- CThe Deny Access permission does not restrict the deletion of files.
- DJohn is a member of another group having the Full Control permission on that file.
Correct Answer:
A
A
send
light_mode
delete
Question #34
NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want to the information security policies.
Which of the following are its significant steps?
Each correct answer represents a complete solution. Choose two.
Which of the following are its significant steps?
Each correct answer represents a complete solution. Choose two.
- AAwareness and Training Material Effectiveness
- BAwareness and Training Material Development
- CAwareness and Training Material Implementation
- DAwareness and Training Program Design
Correct Answer:
BD
BD
send
light_mode
delete
Question #35
You are the project manager of the HHH Project. The stakeholders for this project are scattered across the world and you need a method to promote interaction. You determine that a Web conferencing software would be the most cost effective solution. The stakeholders can watch a slide show while you walk them through the project details. The stakeholders can hear you, ask questions via a chat software, and post concerns. What is the danger in this presentation?
- A55 percent of all communication is nonverbal and this approach does not provide non-verbal communications.
- BThe technology is not proven as reliable.
- CThe stakeholders won't really see you.
- DThe stakeholders are not required to attend the entire session.
Correct Answer:
A
A
send
light_mode
delete
Question #36
A Cisco Unified Wireless Network has an AP that does not rely on the central control device of the network. Which type of AP has this characteristic?
send
light_mode
delete
Question #37
Which of the following monitors program activities and modifies malicious activities on a system?
send
light_mode
delete
Question #38
Which of the following statements is not true about a digital certificate?
- AIt is used with both public key encryption and private key encryption.
- BIt is used with private key encryption.
- CIt is neither used with public key encryption nor with private key encryption.
- DIt is used with public key encryption.
Correct Answer:
D
D
send
light_mode
delete
Question #39
Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?
- ACross-Site Request Forgery
- BCode injection attack
- CCross-Site Scripting attack
- DCommand injection attack
Correct Answer:
B
B
send
light_mode
delete
Question #40
Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?
- AElectronic Communications Privacy Act of 1986
- BEconomic Espionage Act of 1996
- CComputer Fraud and Abuse Act
- DWiretap Act
Correct Answer:
A
A
send
light_mode
delete
All Pages