GIAC GISF - GIAC Information Security Fundamentals
Jane works as a Consumer Support Technician for McRoberts Inc. The company provides troubleshooting support to users. A user named Peter installs Windows Vista on his computer. He connects his computer on the network. He wants to protect his computer from malicious software and prevent hackers from gaining access to his computer through the network. Which of the following actions will Jane assist Peter to perform to accomplish the task?
What are packet sniffers?
Which of the following tools is an open source protocol analyzer that can capture traffic in real time?
Which of the following statements are true about TCP/IP model?
Each correct answer represents a complete solution. Choose all that apply.
You work as the Network Administrator of TechJobs. You implement a security policy, to be in effect at all times, on the client computer in your network. While troubleshooting, assistant administrators often change security settings on the network. You want the security policy to be reapplied after changes have been made. How can you automate this task? (Click the Exhibit button on the toolbar to see the case study.)
Which of the following encryption techniques does digital signatures use?
A company would like your consulting firm to review its current network and suggest changes that will increase its efficiency and optimize the business processes.
To design such a network, you prepare a case study.
Which of the following policies should be implemented through a group policy that is associated with the netperfect.com domain?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose all that apply.
Which of the following attacks saturates network resources and disrupts services to a specific computer?
Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?
Which of the following statements about Encapsulating Security Payload (ESP) are true?
Each correct answer represents a complete solution. Choose two.
