Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISF - GIAC Information Security Fundamentals

Page: 7 / 10
Total 333 questions

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

A.

Technical representative

B.

Legal representative

C.

Lead investigator

D.

Information security representative

Which of the following wireless security features provides the best wireless security mechanism?

A.

WPA with 802.1X authentication

B.

WPA with Pre Shared Key

C.

WPA

D.

WEP

Which of the following devices or hardware parts employs SMART model system as a monitoring system?

A.

Modem

B.

RAM

C.

Hard disk

D.

IDS

Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?

A.

Firewall

B.

Automatic Updating

C.

Other Security Settings

D.

Malware Protection

You work as a Software Developer for uCertify Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

A.

Cryptographer

B.

Cryptographic toolkit

C.

Cryptosystem

D.

Cryptanalyst

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

A.

Sending deceptive e-mails

B.

Sending notifications

C.

Shunning

D.

Logging

E.

Spoofing

F.

Network Configuration Changes

In which type of access control do user ID and password system come under?

A.

Physical

B.

Power

C.

Technical

D.

Administrative

Your network utilizes a coax cable for connections between various network segments. Your predecessor made sure none of the coax cables were in an exposed area that could easily be accessed. This caused the use of significant extra cabling. Why do you think this was done?

A.

This was an error you should correct. It wastes the cable and may make maintenance more difficult.

B.

He was concerned about wireless interception of data.

C.

He was concerned about electromagnetic emanation being used to gather data.

D.

He was concerned about vampire taps.

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

A.

Cyber squatting

B.

Cyber Stalking

C.

Man-in-the-middle attack

D.

Spoofing

Which of the following statements are true about UDP?

Each correct answer represents a complete solution. Choose all that apply.

A.

UDP is an unreliable protocol.

B.

FTP uses a UDP port for communication.

C.

UDP is a connectionless protocol.

D.

TFTP uses a UDP port for communication.

E.

UDP works at the data-link layer of the OSI model.