Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISF - GIAC Information Security Fundamentals

Page: 2 / 10
Total 333 questions

Jane works as a Consumer Support Technician for McRoberts Inc. The company provides troubleshooting support to users. A user named Peter installs Windows Vista on his computer. He connects his computer on the network. He wants to protect his computer from malicious software and prevent hackers from gaining access to his computer through the network. Which of the following actions will Jane assist Peter to perform to accomplish the task?

A.

Don't stay logged on as an administrator.

B.

Use a firewall.

C.

Keep the computer up-to-date.

D.

Run antivirus software on the computer.

What are packet sniffers?

A.

Packet sniffers encrypt the packages as they cross the network.

B.

Packet sniffers test package security.

C.

Packet sniffers test the packages to verify data integrity.

D.

Packet sniffers capture the packages as they cross the network.

Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

A.

Snort

B.

Wireshark

C.

NetWitness

D.

Netresident

Which of the following statements are true about TCP/IP model?

Each correct answer represents a complete solution. Choose all that apply.

A.

It is consists of various protocols present in each layer.

B.

It describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network.

C.

It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.

D.

It is generally described as having five abstraction layers.

You work as the Network Administrator of TechJobs. You implement a security policy, to be in effect at all times, on the client computer in your network. While troubleshooting, assistant administrators often change security settings on the network. You want the security policy to be reapplied after changes have been made. How can you automate this task? (Click the Exhibit button on the toolbar to see the case study.)

A.

Create a group policy object (GPO) and implement it to the domain. Configure a security policy on it. Give Administrators read-only permission on that GPO.

B.

Create a separate OU for the Administrators to test the security settings.

C.

Ask the assistant administrators to re-apply the security policy after the changes have been made.

D.

Schedule the SECEDIT command to run on the client computers.

Which of the following encryption techniques does digital signatures use?

A.

MD5

B.

RSA

C.

IDEA

D.

Blowfish

A company would like your consulting firm to review its current network and suggest changes that will increase its efficiency and optimize the business processes.

To design such a network, you prepare a case study.

Which of the following policies should be implemented through a group policy that is associated with the netperfect.com domain?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose all that apply.

A.

Account lockout policy.

B.

Password policy.

C.

Limit computers that can access production schedule software.

D.

Assign MS Office suite to appropriate users.

Which of the following attacks saturates network resources and disrupts services to a specific computer?

A.

Teardrop attack

B.

Replay attack

C.

Denial-of-Service (DoS) attack

D.

Polymorphic shell code attack

Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

A.

Trademark laws

B.

Patent laws

C.

Copyright laws

D.

Code Security law

Which of the following statements about Encapsulating Security Payload (ESP) are true?

Each correct answer represents a complete solution. Choose two.

A.

It can also be nested with the Layer Two Tunneling Protocol (L2TP).

B.

It is an IPSec protocol.

C.

It is a text-based communication protocol.

D.

It uses TCP port 22 as the default port and operates at the application layer.