GIAC GISF - GIAC Information Security Fundamentals
Which of the following statements about a brute force attack is true?
You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?
Which of the following are the benefits of information classification for an organization?
You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?
You have purchased a wireless router for your home network. What will you do first to enhance the security?
You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?
You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?
You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?
Which of the following is used in asymmetric encryption?
Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.
