Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GISF Exam Dumps - GIAC Certification Questions and Answers

Question # 34

Which of the following types of firewalls looks deep into packets and makes granular access control decisions?

Options:

A.

Stateful

B.

Application level proxy

C.

Circuit level proxy

D.

Packet filtering

Buy Now
Question # 35

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?

Options:

A.

Apply firewalls at appropriate spots.

B.

Download and install new firmware patch for the router.

C.

Disable the SSID broadcast feature of the router.

D.

Apply a standard ACL on the router.

Buy Now
Question # 36

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Boot sector

B.

Multipartite

C.

File

D.

Stealth

Buy Now
Question # 37

You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

Options:

A.

SHA

B.

AES

C.

MD5

D.

DES

Buy Now
Question # 38

Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?

Options:

A.

Asymmetric

B.

Symmetric

C.

Numeric

D.

Hashing

Buy Now
Question # 39

Which of the following are the differences between routed protocols and routing protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

A routing protocol is configured on an interface and decides the method of packet delivery.

B.

A routing protocol decides the path for a packet through the network.

C.

A routed protocol is configured on an interface and decides how a packet will be delivered.

D.

A routed protocol works on the transport layer of the OSI model.

Buy Now
Question # 40

Which of the following processes is accountable for monitoring an IT Service and detecting when the performance drops beneath adequate limits?

Options:

A.

Service Asset and Configuration Management

B.

Service Request Management

C.

Event Management

D.

Service Level Management

Buy Now
Question # 41

Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?

Options:

A.

S/MIME

B.

PGP

C.

Asymmetric encryption

D.

Symmetric encryption

Buy Now
Question # 42

Which of the following protocols work at the Network layer of the OSI model?

Options:

A.

Internet Group Management Protocol (IGMP)

B.

Simple Network Management Protocol (SNMP)

C.

Routing Information Protocol (RIP)

D.

File Transfer Protocol (FTP)

Buy Now
Question # 43

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Options:

A.

Corrective controls

B.

Detective controls

C.

Safeguards

D.

Preventive controls

Buy Now
Exam Code: GISF
Exam Name: GIAC Information Security Fundamentals
Last Update: Aug 24, 2025
Questions: 333
GISF pdf

GISF PDF

$25.5  $84.99
GISF Engine

GISF Testing Engine

$28.5  $94.99
GISF PDF + Engine

GISF PDF + Testing Engine

$40.5  $134.99