Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISF - GIAC Information Security Fundamentals

Page: 6 / 10
Total 333 questions

Which of the following statements about a brute force attack is true?

A.

It is a program that allows access to a computer without using security checks.

B.

It is an attack in which someone accesses your e-mail server and sends misleading information to others.

C.

It is a virus that attacks the hard drive of a computer.

D.

It is a type of spoofing attack.

E.

It is an attempt by an attacker to guess passwords until he succeeds.

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?

A.

Apply firewalls at appropriate spots.

B.

Download and install new firmware patch for the router.

C.

Disable the SSID broadcast feature of the router.

D.

Apply a standard ACL on the router.

Which of the following are the benefits of information classification for an organization?

A.

It helps identify which information is the most sensitive or vital to an organization.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes

C.

It helps identify which protections apply to which information.

D.

It helps reduce the Total Cost of Ownership (TCO).

You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

A.

FTP

B.

Gopher

C.

Firewall

D.

HTTP

You have purchased a wireless router for your home network. What will you do first to enhance the security?

A.

Change the default password and administrator's username on the router

B.

Disable the network interface card on the computer

C.

Configure DMZ on the router

D.

Assign a static IP address to the computers

You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?

A.

Network Based

B.

Dictionary

C.

Heuristic

D.

Host based

You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?

A.

Risk Management Plan

B.

Communications Management Plan

C.

Stakeholder management strategy

D.

Resource Management Plan

You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

A.

Vertical Privilege Escalation

B.

Session Hijacking

C.

Account hijacking

D.

Horizontal Privilege Escalation

Which of the following is used in asymmetric encryption?

A.

Public key and user key

B.

Public key and private key

C.

SSL

D.

NTFS

Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.

A.

Maintaining cordial relationship with project sponsors

B.

Reporting your project management appearance

C.

Staying up-to-date with project management practices

D.

Staying up-to-date with latest industry trends and new technology