Pass the GIAC GIAC Certification GISF Questions and answers with CertsForce

Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions
Questions # 21:

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

Options:

A.

Sending deceptive e-mails


B.

Sending notifications


C.

Shunning


D.

Logging


E.

Spoofing


F.

Network Configuration Changes


Expert Solution
Questions # 22:

Which of the following types of attack can guess a hashed password?

Options:

A.

Teardrop attack


B.

Evasion attack


C.

Denial of Service attack


D.

Brute force attack


Expert Solution
Questions # 23:

You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of ____.

Options:

A.

Bribery


B.

Irresponsible practice


C.

Illegal practice


D.

Conflict of interest


Expert Solution
Questions # 24:

Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Maintaining cordial relationship with project sponsors


B.

Reporting your project management appearance


C.

Staying up-to-date with project management practices


D.

Staying up-to-date with latest industry trends and new technology


Expert Solution
Questions # 25:

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

Options:

A.

Data encrypted with the secret key can only be decrypted by another secret key.


B.

The secret key can encrypt a message, and anyone with the public key can decrypt it.


C.

Data encrypted by the public key can only be decrypted by the secret key.


D.

The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.


Expert Solution
Questions # 26:

Which of the following are the benefits of information classification for an organization?

Options:

A.

It helps identify which information is the most sensitive or vital to an organization.


B.

It ensures that modifications are not made to data by unauthorized personnel or processes


C.

It helps identify which protections apply to which information.


D.

It helps reduce the Total Cost of Ownership (TCO).


Expert Solution
Questions # 27:

You are the project manager for a software technology company. You and the project team have identified that the executive staff is not fully committed to the project. Which of the following best describes the risk?

Options:

A.

Residual risks


B.

Trend analysis


C.

Schedule control


D.

Organizational risks


Expert Solution
Questions # 28:

Which of the following protocols is used to prevent switching loops in networks with redundant switched paths?

Options:

A.

Cisco Discovery Protocol (CDP)


B.

Spanning Tree Protocol (STP)


C.

File Transfer Protocol (FTP)


D.

VLAN Trunking Protocol (VTP)


Expert Solution
Questions # 29:

You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?

Options:

A.

Network Based


B.

Dictionary


C.

Heuristic


D.

Host based


Expert Solution
Questions # 30:

The IT Director of the company is very concerned about the security of the network. Which audit policy should he implement to detect possible intrusions into the network? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

The success and failure auditing for policy change.


B.

The success and failure auditing for process tracking.


C.

The success and failure auditing for logon events.


D.

The success and failure auditing for privilege use.


Expert Solution
Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions