Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GISF Exam Dumps - GIAC Certification Questions and Answers

Question # 24

The IT Director of the company is very concerned about the security of the network. Which audit policy should he implement to detect possible intrusions into the network? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

The success and failure auditing for policy change.

B.

The success and failure auditing for process tracking.

C.

The success and failure auditing for logon events.

D.

The success and failure auditing for privilege use.

Buy Now
Question # 25

Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Maintaining cordial relationship with project sponsors

B.

Reporting your project management appearance

C.

Staying up-to-date with project management practices

D.

Staying up-to-date with latest industry trends and new technology

Buy Now
Question # 26

You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?

Options:

A.

Kerberos

B.

HTTPS

C.

RSA

D.

IPSEC

Buy Now
Question # 27

A company would like your consulting firm to review its current network and suggest changes that will increase its efficiency and optimize the business processes.

To design such a network, you prepare a case study.

Which of the following policies should be implemented through a group policy that is associated with the netperfect.com domain?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Account lockout policy.

B.

Password policy.

C.

Limit computers that can access production schedule software.

D.

Assign MS Office suite to appropriate users.

Buy Now
Question # 28

You work as the Network Administrator of TechJobs. You implement a security policy, to be in effect at all times, on the client computer in your network. While troubleshooting, assistant administrators often change security settings on the network. You want the security policy to be reapplied after changes have been made. How can you automate this task? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Create a group policy object (GPO) and implement it to the domain. Configure a security policy on it. Give Administrators read-only permission on that GPO.

B.

Create a separate OU for the Administrators to test the security settings.

C.

Ask the assistant administrators to re-apply the security policy after the changes have been made.

D.

Schedule the SECEDIT command to run on the client computers.

Buy Now
Question # 29

Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?

Options:

A.

Firewall

B.

Automatic Updating

C.

Other Security Settings

D.

Malware Protection

Buy Now
Question # 30

Which of the following statements are true about Dsniff?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a virus.

B.

It contains Trojans.

C.

It is antivirus.

D.

It is a collection of various hacking tools.

Buy Now
Question # 31

Which of the following provide data confidentiality services by encrypting the data sent between wireless systems?

Each correct answer represents a complete solution. Choose two.

Options:

A.

MS-CHAP v2

B.

WEP

C.

PAP

D.

WPA

Buy Now
Question # 32

Which of the following are application layer protocols of Internet protocol (IP) suite?

Each correct answer represents a complete solution. Choose two.

Options:

A.

IGP

B.

IGRP

C.

Telnet

D.

SMTP

Buy Now
Question # 33

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

Options:

A.

Smurf DoS attack

B.

Teardrop attack

C.

Fraggle DoS attack

D.

Ping flood attack

Buy Now
Exam Code: GISF
Exam Name: GIAC Information Security Fundamentals
Last Update: Aug 24, 2025
Questions: 333
GISF pdf

GISF PDF

$25.5  $84.99
GISF Engine

GISF Testing Engine

$28.5  $94.99
GISF PDF + Engine

GISF PDF + Testing Engine

$40.5  $134.99