Pass the GIAC GIAC Certification GISF Questions and answers with CertsForce

Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

Options:

A.

Technical representative


B.

Legal representative


C.

Lead investigator


D.

Information security representative


Expert Solution
Questions # 2:

Fred is the project manager for the TCC Company. His company has an internal policy that states each year they will provide free services to a nonprofit organization. Therefore, the company and its employees are not allowed to charge or receive money or gifts from the nonprofit organization they choose to provide free services. This year, the TCC Company offers to provide project management services to the children's hospital for a marketing campaign to raise money. Due to the TCC Company's project management services, the nonprofit agency exceeded previous years fund raising efforts. To show appreciation the nonprofit organization offered to reimburse the project manager for his travel expenses. Which of the following best describes how the project manager should handle the situation?

Options:

A.

Say thank you and let them pay for the travel, it is the least they can do.


B.

Tell the hospital no thank you and explain it is against company policy to accept payment for services provided to their pro bono customers.


C.

Say nothing as to not hurt the feelings of the children's hospital.


D.

Ask if the hospital could pay for some of the supplies too.


Expert Solution
Questions # 3:

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Recovery


B.

Contamination


C.

Identification


D.

Eradication


E.

Preparation


Expert Solution
Questions # 4:

Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

Options:

A.

Teardrop attack


B.

SYN flood attack


C.

Ping of Death attack


D.

DDoS attack


Expert Solution
Questions # 5:

Which of the following is used in asymmetric encryption?

Options:

A.

Public key and user key


B.

Public key and private key


C.

SSL


D.

NTFS


Expert Solution
Questions # 6:

You are the project manager for BlueWell Inc. You are reviewing the risk register for your project. The risk register provides much information to you, the project manager and to the project team during the risk response planning. All of the following are included in the risk register except for which item?

Options:

A.

Trends in qualitative risk analysis results


B.

Symptoms and warning signs of risks


C.

List of potential risk responses


D.

Network diagram analysis of critical path activities


Expert Solution
Questions # 7:

You work as the Security Administrator for Prodotxiss Inc. You want to ensure the security of your Wi-Fi enterprise network against the wireless snooping attacks. Which of the following measures will you take over the site network devices of the network?

Options:

A.

Apply firewalls at appropriate spots.


B.

Download and install new firmware patch for the router.


C.

Disable the SSID broadcast feature of the router.


D.

Apply a standard ACL on the router.


Expert Solution
Questions # 8:

Which of the following are the types of Intrusion detection system?

Options:

A.

Server-based intrusion detection system (SIDS)


B.

Client based intrusion detection system (CIDS)


C.

Host-based intrusion detection system (HIDS)


D.

Network intrusion detection system (NIDS)


Expert Solution
Questions # 9:

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WPA with 802.1X authentication


B.

WPA with Pre Shared Key


C.

WPA


D.

WEP


Expert Solution
Questions # 10:

Which of the following devices or hardware parts employs SMART model system as a monitoring system?

Options:

A.

Modem


B.

RAM


C.

Hard disk


D.

IDS


Expert Solution
Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions