Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GISF Exam Dumps - GIAC Certification Questions and Answers

Question # 44

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site. The We-are-secure login page is vu lnerable to a __________.

Options:

A.

Social engineering

B.

Smurf DoS

C.

Brute force

D.

Ping flood attack

Buy Now
Question # 45

Rick works as a Network Administrator for Fimbry Hardware Inc. Based on the case study, which network routing strategy will he implement for the company? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

He will implement OSPF on all the router interfaces.

B.

He will implement RIP v1 on all the router interfaces.

C.

He will implement the IGMP on all the router interface.

D.

He will implement RIP v2 on all the router interfaces.

E.

He will implement static routes for the routers.

Buy Now
Question # 46

Which of the following are the benefits of information classification for an organization?

Options:

A.

It helps identify which information is the most sensitive or vital to an organization.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes

C.

It helps identify which protections apply to which information.

D.

It helps reduce the Total Cost of Ownership (TCO).

Buy Now
Question # 47

Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

Options:

A.

Teardrop attack

B.

SYN flood attack

C.

Ping of Death attack

D.

DDoS attack

Buy Now
Question # 48

You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?

Options:

A.

Network Based

B.

Dictionary

C.

Heuristic

D.

Host based

Buy Now
Question # 49

Which of the following protocols is used to prevent switching loops in networks with redundant switched paths?

Options:

A.

Cisco Discovery Protocol (CDP)

B.

Spanning Tree Protocol (STP)

C.

File Transfer Protocol (FTP)

D.

VLAN Trunking Protocol (VTP)

Buy Now
Question # 50

Which Wireless network standard operates at 2.4 GHz and transfers data at a rate of 54 Mbps?

Options:

A.

802.11a

B.

802.11n

C.

802.11b

D.

802.11g

Buy Now
Question # 51

You work as the Senior Project manager in Dotcoiss Inc. Your company has started a software project using configuration management and has completed 70% of it. You need to ensure that the network infrastructure devices and networking standards used in this project are installed in accordance with the requirements of its detailed project design documentation. Which of the following procedures will you employ to accomplish the task?

Options:

A.

Physical configuration audit

B.

Configuration control

C.

Functional configuration audit

D.

Configuration identification

Buy Now
Question # 52

Which of the following types of attack can guess a hashed password?

Options:

A.

Teardrop attack

B.

Evasion attack

C.

Denial of Service attack

D.

Brute force attack

Buy Now
Exam Code: GISF
Exam Name: GIAC Information Security Fundamentals
Last Update: Aug 24, 2025
Questions: 333
GISF pdf

GISF PDF

$25.5  $84.99
GISF Engine

GISF Testing Engine

$28.5  $94.99
GISF PDF + Engine

GISF PDF + Testing Engine

$40.5  $134.99