Pass the GIAC GIAC Certification GISF Questions and answers with CertsForce

Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions
Questions # 31:

What is VeriSign?

Options:

A.

It is a data warehouse.


B.

It is an e-commerce portal.


C.

It is a search engine.


D.

It is a payment gateway.


Expert Solution
Questions # 32:

You work as a Software Developer for uCertify Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:

A.

Cryptographer


B.

Cryptographic toolkit


C.

Cryptosystem


D.

Cryptanalyst


Expert Solution
Questions # 33:

You have purchased a wireless router for your home network. What will you do first to enhance the security?

Options:

A.

Change the default password and administrator's username on the router


B.

Disable the network interface card on the computer


C.

Configure DMZ on the router


D.

Assign a static IP address to the computers


Expert Solution
Questions # 34:

Jane works as a Consumer Support Technician for McRoberts Inc. The company provides troubleshooting support to users. A user named Peter installs Windows Vista on his computer. He connects his computer on the network. He wants to protect his computer from malicious software and prevent hackers from gaining access to his computer through the network. Which of the following actions will Jane assist Peter to perform to accomplish the task?

Options:

A.

Don't stay logged on as an administrator.


B.

Use a firewall.


C.

Keep the computer up-to-date.


D.

Run antivirus software on the computer.


Expert Solution
Questions # 35:

Which of the following types of firewalls looks deep into packets and makes granular access control decisions?

Options:

A.

Stateful


B.

Application level proxy


C.

Circuit level proxy


D.

Packet filtering


Expert Solution
Questions # 36:

Donna is the project manager for her organization. She is preparing a plan to manage changes to the project should changes be requested. Her change management plan defines the process for documenting, tracking, and determining if the changes should be approved or declined. What system is considered the parent of the change control system documented in Donna's plan?

Options:

A.

Project Management Information System


B.

Integrated Change Control System


C.

Change Control System


D.

Quality Management System


Expert Solution
Questions # 37:

Which of the following statements are true about classless routing protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

They extend the IP addressing scheme.


B.

The same subnet mask is used everywhere on the network.


C.

They support VLSM and discontiguous networks.


D.

IGRP is a classless routing protocol.


Expert Solution
Questions # 38:

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

Options:

A.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer


B.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer


C.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer


D.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer


Expert Solution
Questions # 39:

Which of the following is the main purpose of using OODA loops?

Options:

A.

Providing economic balance


B.

Making the information delivery process faster


C.

Information welfare


D.

Creating advanced military weapons


Expert Solution
Questions # 40:

Which of the following categories of the network management model is used to detect and log network problems or device failures?

Options:

A.

Fault Management


B.

Configuration Management


C.

Security Management


D.

Performance Management


Expert Solution
Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions