Want to Pass GISF Exam In Next HOURS? Get it now →
January 12, 2018

What Rebirth GISF Is?

we provide Real GIAC GISF exam answers which are the best for clearing GISF test, and to get certified by GIAC GIAC Information Security Fundamentals. The GISF Questions & Answers covers all the knowledge points of the real GISF exam. Crack your GIAC GISF Exam with latest dumps, guaranteed!

Q41. Which of the following statements about Secure Shell (SSH) are true? 

Each correct answer represents a complete solution. Choose three. 

A. It was designed as a replacement for TELNET and other insecure shells. 

B. It is a network protocol used primarily on Linux and Unix based systems. 

C. It allows data to be exchanged using a secure channel between two networked devices. 

D. It is the core routing protocol of the Internet. 

Answer: A,B,C 


Q42. You work as a Software Developer for Mansoft Inc. You have participated in the customization of a previously developed Configuration Management Application Block (CMAB) that manages an application configuration setting in multiple data stores. Based on requirements, you have extended the CMAB to read and write configuration data to and from an Oracle database. You need to create a unit test strategy. Which of the following steps would you include in a unit test of the CMAB? 

Each correct answer represents a part of the solution. Choose all that apply. 

A. Perform White box testing 

B. Regression test the existing functionality 

C. Execute Use cases of the application 

D. Perform Stress testing 

E. Review the implementation 

Answer: A,B,E 


Q43. Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis? 

A. Public key 

B. Digital certificates 

C. Twofish 

D. RSA 

Answer: A,B 


Q44. Which of the following types of virus is capable of changing its signature to avoid detection? 

A. Stealth virus 

B. Boot sector virus 

C. Macro virus 

D. Polymorphic virus 

Answer:


Q45. The security of a computer against the unauthorized usage largely depends upon the efficiency of the applied access control method. Which of the following statements are true about a computer access control method? 

Each correct answer represents a complete solution. Choose all that apply. 

A. It can be based upon fingerprint or eye recognition. 

B. It can be time-synchronous. 

C. It provides security against the virus attacks. 

D. It provides security against Eavesdropping. 

E. It checks the authenticity of a person. 

F. It is used to encrypt a message before transmitting it on a network. 

Answer: A,B,E 


Q46. Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data? 

A. Symmetric 

B. Numeric 

C. Hashing 

D. Asymmetric 

Answer:


Q47. Under the SMART scheme, the Predictive Failure Analysis Technology is used to determine the failure or crash for which of the following parts of a computer system? 

A. Operating System 

B. Hard Disc drive 

C. Software 

D. Internet Browser 

Answer:


Q48. You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted, however, you want the least overhead/difficulty in the encryption process. Which of the following should you choose? 

A. MD5 

B. DES 

C. Symmetric Encryption 

D. Asymmetric Encryption 

Answer:


Q49. You work as a Software Developer for Mansoft Inc. You, together with a team, develop a distributed application that processes orders from multiple types of clients. The application uses SQL Server to store data for all orders. The application does not implement any custom performance counters. After the application is deployed to production, it must be monitored for performance spikes. What will you do to monitor performance spikes in the application in a deployment environment? 

Each correct answer represents a part of the solution. Choose all that apply. 

A. Use SQL Profiler 

B. Use CLR Profiler 

C. Use Windows System Monitor 

D. Use Microsoft Operations Manager 

Answer: A,C,D 


Q50. Availability Management allows organizations to sustain the IT service availability to support the business at a justifiable cost. Which of the following elements of Availability Management is used to perform at an agreed level over a period of time? 

Each correct answer represents a part of the solution. Choose all that apply. 

A. Maintainability 

B. Resilience 

C. Error control 

D. Recoverability 

E. Reliability 

F. Security 

G. Serviceability 

Answer: A,B,D,E,F,G 



see more free GISF exam dumps