10 Tips For GISF candidates
Our pass rate is high to 98.9% and the similarity percentage between our GISF study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the GIAC GISF exam in just one try? I am currently studying for the GIAC GISF exam. Latest GIAC GISF Test exam practice questions and answers, Try GIAC GISF Brain Dumps First.
Q31. You switch on your mobile Bluetooth device to transfer data to another Bluetooth device. Which of the following Information assurance pillars ensures that the data transfer is being performed with the targeted authorized Bluetooth device and not with any other or unauthorized device?
A. Data integrity
Q32. Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?
A. Cross-Site Request Forgery
B. Code injection attack
C. Cross-Site Scripting attack
D. Command injection attack
Q33. Which of the following statements are true about Dsniff?
Each correct answer represents a complete solution. Choose two.
A. It is a virus.
B. It contains Trojans.
C. It is antivirus.
D. It is a collection of various hacking tools.
Q34. John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system. He wants to sniff the weare- secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?
Q35. You work as a Network Administrator for Net World Inc. The company has a TCP/IP-based network.
You have configured an Internet access router on the network. A user complains that he is unable to access a resource on the Web. You know that a bad NAT table entry is causing the issue. You decide to clear all the entries on the table. Which of the following commands will you use?
A. show ip dhcp binding
B. ipconfig /flushdns
C. ipconfig /all
D. clear ip nat translation *
Q36. Hardening a system is one of the practical methods of securing a computer system. Which of the following techniques is used for hardening a computer system?
A. Applying Access Control List (ACL)
B. Disabling all user accounts
C. Applying a patch to the OS kernel
D. Applying egress filtering
Q37. Which of the following types of firewall functions at the Session layer of OSI model?
A. Circuit-level firewall
B. Application-level firewall
C. Switch-level firewall
D. Packet filtering firewall
Q38. You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client A. Antivirus software is running on the computer.
B. You have provided an improper product key.
C. The computer is running a driver that is incompatible with Vista.
D. The computer has a hardware device that is incompatible with Vista.
Q39. According to the case study, what protocol should be used to protect a customer's privacy and credit card information?
(Click the Exhibit button on the toolbar to see the case study.)
Q40. A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?