Pass the GIAC GIAC Certification GISF Questions and answers with CertsForce

Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following statements about a brute force attack is true?

Options:

A.

It is a program that allows access to a computer without using security checks.


B.

It is an attack in which someone accesses your e-mail server and sends misleading information to others.


C.

It is a virus that attacks the hard drive of a computer.


D.

It is a type of spoofing attack.


E.

It is an attempt by an attacker to guess passwords until he succeeds.


Expert Solution
Questions # 12:

You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

Options:

A.

FTP


B.

Gopher


C.

Firewall


D.

HTTP


Expert Solution
Questions # 13:

Which of the following logs contains events pertaining to security as defined in the Audit policy?

Options:

A.

DNS server log


B.

Application log


C.

System log


D.

Directory Service log


E.

Security log


F.

File Replication Service log


Expert Solution
Questions # 14:

Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?

Options:

A.

Firewall


B.

Automatic Updating


C.

Other Security Settings


D.

Malware Protection


Expert Solution
Questions # 15:

You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?

Options:

A.

Kerberos


B.

HTTPS


C.

RSA


D.

IPSEC


Expert Solution
Questions # 16:

You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

Options:

A.

Vertical Privilege Escalation


B.

Session Hijacking


C.

Account hijacking


D.

Horizontal Privilege Escalation


Expert Solution
Questions # 17:

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

Options:

A.

Antivirus log


B.

System log


C.

IDS log


D.

Firewall log


Expert Solution
Questions # 18:

You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?

Options:

A.

Risk Management Plan


B.

Communications Management Plan


C.

Stakeholder management strategy


D.

Resource Management Plan


Expert Solution
Questions # 19:

Rick works as a Network Administrator for Fimbry Hardware Inc. Based on the case study, which network routing strategy will he implement for the company? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

He will implement OSPF on all the router interfaces.


B.

He will implement RIP v1 on all the router interfaces.


C.

He will implement the IGMP on all the router interface.


D.

He will implement RIP v2 on all the router interfaces.


E.

He will implement static routes for the routers.


Expert Solution
Questions # 20:

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

Options:

A.

Antivirus


B.

Backup


C.

Symmetric encryption


D.

Firewall


Expert Solution
Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions