Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GISF - GIAC Information Security Fundamentals

Page: 9 / 10
Total 333 questions

Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?

A.

Asymmetric

B.

Symmetric

C.

Numeric

D.

Hashing

TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?

A.

Windows

B.

Red Hat

C.

Solaris

D.

Knoppix

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A.

Cryptography

B.

OODA loop

C.

Risk analysis

D.

Firewall security

You work as a SharePoint Administrator for TechWorld Inc. You must protect your SharePoint server farm from viruses that are accidentally uploaded to the SharePoint libraries. You have installed antivirus software that is designed for use with Windows SharePoint server. You have logged on to the Central Administration site.

How can you configure the SharePoint site so that the document libraries are protected?

A.

SharePoint does not support antivirus solutions.

B.

Restrict users to read only on document libraries.

C.

Choose the Scan documents on upload option in the antivirus settings.

D.

Require all documents to be scanned on the local PC before uploading to the SharePoint sit e.

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data?

A.

Symmetric

B.

Numeric

C.

Hashing

D.

Asymmetric

Which of the following statements are TRUE regarding asymmetric encryption and symmetric encryption? Each correct answer represents a complete solution. Choose all that apply.

A.

Data Encryption Standard (DES) is a symmetric encryption key algorithm.

B.

In symmetric encryption, the secret key is available only to the recipient of the message.

C.

Symmetric encryption is commonly used when a message sender needs to encrypt a large amount of data.

D.

Asymmetric encryption uses a public key and a private key pair for data encryption.

You want to ensure that everyone who sends you an email should encrypt it. However you do not wish to exchange individual keys with all people who send you emails. In order to accomplish this goal which of the following should you choose?

A.

DES

B.

AES

C.

Symmetric Encryption

D.

Public Key encryption

You are the project manager of a new project in your organization. You and the project team have identified the project risks, completed risk analysis, and are planning the most appropriate risk responses. Which of the following tools is most effective to choose the most appropriate risk response?

A.

Project network diagrams

B.

Delphi Technique

C.

Decision tree analysis

D.

Cause-and-effect diagrams

Which of the following algorithms produce 160-bit hash values?

Each correct answer represents a complete solution. Choose two.

A.

MD2

B.

MD5

C.

SHA-1

D.

SHA-0

Security is responsible for well-being of information and infrastructures in which the possibilities of successful yet undetected theft, tampering, and/or disruption of information and services are kept low or tolerable. Which of the following are the elements of security?

Each correct answer represents a complete solution. Choose all that apply.

A.

Availability

B.

Confidentiality

C.

Confidentiality

D.

Authenticity