Pass the GIAC GIAC Certification GISF Questions and answers with CertsForce

Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions
Questions # 71:

Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email address. He suspects that the emails he is receiving are the Spam. Which of the following steps will he take to stop the Spam?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Forward a copy of the spam to the ISP to make the ISP conscious of the spam.


B.

Send an email to the domain administrator responsible for the initiating IP address.


C.

Report the incident to the FTC (The U.S. Federal Trade Commission) by sending a copy of the spam message.


D.

Close existing email account and open new email account.


Expert Solution
Questions # 72:

You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

Options:

A.

By examining your firewall logs.


B.

By examining your domain controller server logs.


C.

By setting up a DMZ.


D.

You cannot, you need an IDS.


Expert Solution
Questions # 73:

You work in an enterprise as a Network Engineer. Your enterprise has a secure internal network.

You want to apply an additional network packet filtering device that is intermediate to your enterprise's internal network and the outer network (internet). Which of the following network zones will you create to accomplish this task?

Options:

A.

Autonomous system area (AS)


B.

Demilitarized zone (DMZ)


C.

Border network area


D.

Site network area


Expert Solution
Questions # 74:

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:

A.

Risk acceptance


B.

Risk transfer


C.

Risk avoidance


D.

Risk mitigation


Expert Solution
Questions # 75:

Which of the following provide data confidentiality services by encrypting the data sent between wireless systems?

Each correct answer represents a complete solution. Choose two.

Options:

A.

MS-CHAP v2


B.

WEP


C.

PAP


D.

WPA


Expert Solution
Questions # 76:

A Cisco Unified Wireless Network has an AP that does not rely on the central control device of the network. Which type of AP has this characteristic?

Options:

A.

Lightweight AP


B.

Rogue AP


C.

LWAPP


D.

Autonomous AP


Expert Solution
Questions # 77:

Which of the following statements about asymmetric encryption are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Asymmetric encryption is faster as compared to symmetric encryption.


B.

Asymmetric encryption uses a public key and a private key pair for data encryption.


C.

In asymmetric encryption, only one key is needed to encrypt and decrypt data.


D.

In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.


Expert Solution
Questions # 78:

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

Options:

A.

Cyber squatting


B.

Cyber Stalking


C.

Man-in-the-middle attack


D.

Spoofing


Expert Solution
Questions # 79:

You work as a security manager in Mariotiss Inc. Your enterprise has been facing network and software security threats since a few months. You want to renew your current security policies and management to enhance the safety of your information systems. Which of the following is the best practice to initiate the renewal process from the lowest level with the least managerial effort?

Options:

A.

Start the Incident handling process.


B.

Change the entire security policy.


C.

Perform an IT audit.


D.

Switch to a new network infrastructure.


Expert Solution
Questions # 80:

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Boot sector


B.

Multipartite


C.

File


D.

Stealth


Expert Solution
Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions