Pass the GIAC GIAC Certification GISF Questions and answers with CertsForce

Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions
Questions # 61:

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

Options:

A.

Bandwidth


B.

Load


C.

Delay


D.

Frequency


Expert Solution
Questions # 62:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Options:

A.

PsList


B.

Fpipe


C.

Cain


D.

PsExec


Expert Solution
Questions # 63:

Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

Options:

A.

Snort


B.

Wireshark


C.

NetWitness


D.

Netresident


Expert Solution
Questions # 64:

You work as a Security manager for Orangesect Inc. The enterprise is using the OODA loop strategy to counter the security issues in the enterprise. Some of the IP addresses of the enterprise have been hacked. You match up the present hacking issue and condition with the past hacking experiences to find a solution. Which of the following phases of the OODA loop involves the procedure followed by you?

Options:

A.

The decide phase


B.

The orient phase


C.

The observe phase


D.

The act phase


Expert Solution
Questions # 65:

You are developing an online business solution for National Institute of Meteorological and Oceanographic Research (NIMOR). A case study for the organization is given in the exhibit. Based on the case study, you need to implement Internet security so that no user can hack confidential data. According to you, which of the following security options will you use for your solution? Each correct answer represents a complete solution. Choose all that apply. (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Antivirus and antispyware software


B.

Secure Sockets Layer and digital certificates


C.

Firewall security


D.

Automatic Updates in Windows XP


Expert Solution
Questions # 66:

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows 2008 member servers and 250 Windows Vista client computers. One of the member servers works as a Web server that hosts an intranet Web site. According to the company security policy, Mark needs to fulfill the following requirements:

1. Encryption should be used for authentication of all traffic to the Web site.

2. SSL should not be used on the Web server for performance reasons.

3. Users should be authenticated using their Active Directory credentials.

In order to fulfill the requirements, Mark has disabled the Anonymous Authentication setting on the server. What else does he have to do?

Options:

A.

Enable the Anonymous Authentication setting on the server.


B.

Enable the Encrypting File System (EFS) on the server.


C.

Enable the Digest Authentication setting on the server.


D.

Enable the Windows Authentication setting on the server.


Expert Solution
Questions # 67:

Which of the following is an organization that defines standards for anti-virus software?

Options:

A.

ICSA


B.

IETF


C.

IIS


D.

IEEE


Expert Solution
Questions # 68:

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Options:

A.

Corrective controls


B.

Detective controls


C.

Safeguards


D.

Preventive controls


Expert Solution
Questions # 69:

Which project management risk event would you be using if you changed the sequence of activities to reduce the probability of the project being delayed?

Options:

A.

Enhancing


B.

Withdrawal


C.

Exploiting


D.

Avoidance


Expert Solution
Questions # 70:

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

Options:

A.

Discretionary Access Control (DAC)


B.

Role Based Access Control (RBAC)


C.

Access Control List (ACL)


D.

Mandatory Access Control (MAC)


Expert Solution
Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions