GIAC GISF - GIAC Information Security Fundamentals
Which of the following statements are true about security risks? Each correct answer represents a complete solution. Choose three.
John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is an examination of the controls within an Information technology (IT) infrastructure?
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
Which of the following best describes the identification, analysis, and ranking of risks?
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He enters a single quote in the input field of the login page of the Weare- secure Web site and receives the following error message:
Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'
This error message shows that the We-are-secure Website is vulnerable to __________.
You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?
You work as a Product manager for Marioiss Inc. You have been tasked to start a project for securing the network of your company. You want to employ configuration management to efficiently manage the procedures of the project. What will be the benefits of employing configuration management for completing this project?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following refers to the process of verifying the identity of a person, network host, or system process?
Which of the following types of firewall functions at the Session layer of OSI model?