GIAC GISF Exam Practice Questions (P. 5)
- Full Access (316 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
Which of the following does an anti-virus program update regularly from its manufacturer's Web site?
send
light_mode
delete
Question #42
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?
- AConfigure Network address translation (NAT).
- BDisable Windows firewall logging.
- CConfigure Internet Protocol Security (IPSec).
- DEnable Windows firewall logging.
Correct Answer:
D
D
send
light_mode
delete
Question #43
Hardening a system is one of the practical methods of securing a computer system. Which of the following techniques is used for hardening a computer system?
- ADisabling all user accounts
- BApplying egress filtering
- CApplying Access Control List (ACL)
- DApplying a patch to the OS kernel
Correct Answer:
D
D
send
light_mode
delete
Question #44
You work as a security manager in Mariotiss Inc. Your enterprise has been facing network and software security threats since a few months. You want to renew your current security policies and management to enhance the safety of your information systems. Which of the following is the best practice to initiate the renewal process from the lowest level with the least managerial effort?
- AStart the Incident handling process.
- BChange the entire security policy.
- CPerform an IT audit.
- DSwitch to a new network infrastructure.
Correct Answer:
C
C
send
light_mode
delete
Question #45
You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?
- AA risk probability-impact matrix
- BQuantitative risk analysis
- CQualitative risk analysis
- DSeven risk responses
Correct Answer:
C
C
send
light_mode
delete
Question #46
You are concerned about outside attackers penetrating your network via your company Web server.
You wish to place your Web server between two firewalls
One firewall between the Web server and the outside world
The other between the Web server and your network
What is this called?
You wish to place your Web server between two firewalls
One firewall between the Web server and the outside world
The other between the Web server and your network
What is this called?
send
light_mode
delete
Question #47
In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?
- ADiscretionary Access Control (DAC)
- BRole Based Access Control (RBAC)
- CAccess Control List (ACL)
- DMandatory Access Control (MAC)
Correct Answer:
D
D
send
light_mode
delete
Question #48
Which of the following types of authentications supported by OSPF?
Each correct answer represents a complete solution. Choose three.
Each correct answer represents a complete solution. Choose three.
- AMD5 authentication
- BSimple password authentication
- CNull authentication
- DKerberos v5 authentication
Correct Answer:
ABC
ABC
send
light_mode
delete
Question #49
Which of the following are the differences between routed protocols and routing protocols?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
- AA routing protocol is configured on an interface and decides the method of packet delivery.
- BA routing protocol decides the path for a packet through the network.
- CA routed protocol is configured on an interface and decides how a packet will be delivered.
- DA routed protocol works on the transport layer of the OSI model.
Correct Answer:
BC
BC
send
light_mode
delete
Question #50
Which of the following algorithms produce 160-bit hash values?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
send
light_mode
delete
All Pages