Pass4itsure > GIAC > GIAC Information Security > GISF > GISF Online Practice Questions and Answers

GISF Online Practice Questions and Answers

Questions 4

Availability Management allows organizations to sustain the IT service availability to support the business

at a justifiable cost. Which of the following elements of Availability Management is used to perform at an

agreed level over a period of time?

Each correct answer represents a part of the solution. Choose all that apply.

A. Maintainability

B. Resilience

C. Error control

D. Recoverability

E. Reliability

F. Security

G. Serviceability

Buy Now
Questions 5

According to the case study, what protocol should be used to protect a customer's privacy and credit card

information?

(Click the Exhibit button on the toolbar to see the case study.)

A. L2TP

B. FTP

C. HTTP

D. MS-CHAP

E. HTTPS

F. PPTP

Buy Now
Questions 6

You switch on your mobile Bluetooth device to transfer data to another Bluetooth device. Which of the following Information assurance pillars ensures that the data transfer is being performed with the targeted authorized Bluetooth device and not with any other or unauthorized device?

A. Data integrity

B. Confidentiality

C. Authentication

D. Non-repudiation

Buy Now
Questions 7

You work as an executive manager for Mariotx.Inc. You entered into a business contract with a firm called Helfixnet.Inc. You passed on the contract details to Helfixnet.Inc and also got an acceptance approval. You later find that Helfixnet.Inc is violating the rules of the contract and they claim that they had never entered into any contract with Mariotx.Inc when asked. Which of the following directives of Information Assurance can you apply to ensure prevention from such issues?

A. Confidentiality

B. Non-repudiation

C. Data integrity

D. Data availability

Buy Now
Questions 8

Key Distribution Center is used in which authentication method?

A. Multi-factor

B. Smart cards

C. Biometrics

D. Security tokens

E. Kerberos

F. Challenge Handshake Authentication Protocol

Buy Now
Questions 9

You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company's network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?

A. Antivirus software is running on the computer.

B. You have provided an improper product key.

C. The computer is running a driver that is incompatible with Vista.

D. The computer has a hardware device that is incompatible with Vista.

Buy Now
Questions 10

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?

A. Availability

B. Integrity

C. Confidentiality

D. Authenticity

Buy Now
Questions 11

Which of the following is an information gathering technique that is used to identify risks?

A. Diagramming technique

B. Assumption analysis

C. Checklist analysis

D. Delphi technique

Buy Now
Questions 12

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A. Cookies folder

B. Temporary Internet Folder

C. Download folder

D. History folder

Buy Now
Questions 13

You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

A. Vertical Privilege Escalation

B. Session Hijacking

C. Account hijacking

D. Horizontal Privilege Escalation

Buy Now
Exam Code: GISF
Exam Name: GIAC Information Security Fundamentals
Last Update: Apr 30, 2024
Questions: 333
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99