GIAC GISF - GIAC Information Security Fundamentals
Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?
Which of the following wireless security features provides the best wireless security mechanism?
Which of the following devices or hardware parts employs SMART model system as a monitoring system?
Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?
You work as a Software Developer for uCertify Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?
The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?
In which type of access control do user ID and password system come under?
Your network utilizes a coax cable for connections between various network segments. Your predecessor made sure none of the coax cables were in an exposed area that could easily be accessed. This caused the use of significant extra cabling. Why do you think this was done?
Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?
Which of the following statements are true about UDP?
Each correct answer represents a complete solution. Choose all that apply.
