Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

GIAC GISF GIAC Information Security Fundamentals Exam Practice Test

Page: 1 / 33
Total 333 questions

GIAC Information Security Fundamentals Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

You are the project manager for BlueWell Inc. You are reviewing the risk register for your project. The risk register provides much information to you, the project manager and to the project team during the risk response planning. All of the following are included in the risk register except for which item?

Options:

A.

Trends in qualitative risk analysis results

B.

Symptoms and warning signs of risks

C.

List of potential risk responses

D.

Network diagram analysis of critical path activities

Question 2

Which of the following are the benefits of information classification for an organization?

Options:

A.

It helps identify which information is the most sensitive or vital to an organization.

B.

It ensures that modifications are not made to data by unauthorized personnel or processes

C.

It helps identify which protections apply to which information.

D.

It helps reduce the Total Cost of Ownership (TCO).

Question 3

You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?

Options:

A.

Network Based

B.

Dictionary

C.

Heuristic

D.

Host based

Question 4

You are the project manager for a software technology company. You and the project team have identified that the executive staff is not fully committed to the project. Which of the following best describes the risk?

Options:

A.

Residual risks

B.

Trend analysis

C.

Schedule control

D.

Organizational risks

Question 5

You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?

Options:

A.

FTP

B.

Gopher

C.

Firewall

D.

HTTP

Question 6

Which of the following protocols is used to prevent switching loops in networks with redundant switched paths?

Options:

A.

Cisco Discovery Protocol (CDP)

B.

Spanning Tree Protocol (STP)

C.

File Transfer Protocol (FTP)

D.

VLAN Trunking Protocol (VTP)

Question 7

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Recovery

B.

Contamination

C.

Identification

D.

Eradication

E.

Preparation

Question 8

Which of the following wireless security features provides the best wireless security mechanism?

Options:

A.

WPA with 802.1X authentication

B.

WPA with Pre Shared Key

C.

WPA

D.

WEP

Question 9

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

Options:

A.

Data encrypted with the secret key can only be decrypted by another secret key.

B.

The secret key can encrypt a message, and anyone with the public key can decrypt it.

C.

Data encrypted by the public key can only be decrypted by the secret key.

D.

The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

Question 10

Which of the following devices or hardware parts employs SMART model system as a monitoring system?

Options:

A.

Modem

B.

RAM

C.

Hard disk

D.

IDS

Question 11

You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?

Options:

A.

Vertical Privilege Escalation

B.

Session Hijacking

C.

Account hijacking

D.

Horizontal Privilege Escalation

Question 12

John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?

Options:

A.

Antivirus

B.

Backup

C.

Symmetric encryption

D.

Firewall

Question 13

Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?

Options:

A.

Firewall

B.

Automatic Updating

C.

Other Security Settings

D.

Malware Protection

Question 14

You work as a Software Developer for uCertify Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:

A.

Cryptographer

B.

Cryptographic toolkit

C.

Cryptosystem

D.

Cryptanalyst

Question 15

The IT Director of the company is very concerned about the security of the network. Which audit policy should he implement to detect possible intrusions into the network? (Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

The success and failure auditing for policy change.

B.

The success and failure auditing for process tracking.

C.

The success and failure auditing for logon events.

D.

The success and failure auditing for privilege use.

Question 16

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

Options:

A.

Technical representative

B.

Legal representative

C.

Lead investigator

D.

Information security representative

Question 17

You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?

Options:

A.

Kerberos

B.

HTTPS

C.

RSA

D.

IPSEC

Question 18

The security of a computer against the unauthorized usage largely depends upon the efficiency of the applied access control method. Which of the following statements are true about a computer access control method?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It can be based upon fingerprint or eye recognition.

B.

It can be time-synchronous.

C.

It provides security against the virus attacks.

D.

It provides security against Eavesdropping.

E.

It checks the authenticity of a person.

F.

It is used to encrypt a message before transmitting it on a network.

Question 19

You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

Options:

A.

SHA

B.

AES

C.

MD5

D.

DES

Question 20

You are working on your computer system with Linux Operating system. After working for a few hours, the hard disk goes to the inactive state (sleep). You try to restart the system and check the power circuits. You later discover that the hard disk has crashed. Which of the following precaution methods should you apply to keep your computer safe from such issues?

Options:

A.

Use Incident handling

B.

Use OODA loop

C.

Use Information assurance

D.

Use SMART model.

Question 21

Which of the following factors determine the strength of the encryption?

Options:

A.

Character-set encoding

B.

Length of the key

C.

Operating system

D.

Ease of use

Question 22

You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

Options:

A.

By examining your firewall logs.

B.

By examining your domain controller server logs.

C.

By setting up a DMZ.

D.

You cannot, you need an IDS.

Question 23

Which of the following are the differences between routed protocols and routing protocols?

Each correct answer represents a complete solution. Choose two.

Options:

A.

A routing protocol is configured on an interface and decides the method of packet delivery.

B.

A routing protocol decides the path for a packet through the network.

C.

A routed protocol is configured on an interface and decides how a packet will be delivered.

D.

A routed protocol works on the transport layer of the OSI model.

Question 24

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

Options:

A.

Quantitative risk analysis

B.

Risk audits

C.

Qualitative risk analysis

D.

Requested changes

Question 25

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

Options:

A.

Cyber squatting

B.

Cyber Stalking

C.

Man-in-the-middle attack

D.

Spoofing

Question 26

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

Options:

A.

Public key

B.

Digital certificates

C.

Twofish

D.

RSA

Question 27

Which of the following is a pillar of Information Assurance CIA triad?

Options:

A.

Integrity

B.

Affiliation

C.

Accessibility

D.

Isolation

Question 28

Which of the following algorithms produce 160-bit hash values?

Each correct answer represents a complete solution. Choose two.

Options:

A.

MD2

B.

MD5

C.

SHA-1

D.

SHA-0

Question 29

Which of the following monitors program activities and modifies malicious activities on a system?

Options:

A.

Back door

B.

HIDS

C.

RADIUS

D.

NIDS

Question 30

In which type of access control do user ID and password system come under?

Options:

A.

Physical

B.

Power

C.

Technical

D.

Administrative

Question 31

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

Options:

A.

Containment

B.

Identification

C.

Preparation

D.

Eradication

Question 32

You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant. Which algorithm are they most likely using for hashing?

Options:

A.

PKI

B.

MD5

C.

SHA

D.

Kerberos

Question 33

You work as a Network Administrator for Net World Inc. The company has a TCP/IP-based network.

You have configured an Internet access router on the network. A user complains that he is unable to access a resource on the Web. You know that a bad NAT table entry is causing the issue. You decide to clear all the entries on the table. Which of the following commands will you use?

Options:

A.

show ip dhcp binding

B.

ipconfig /flushdns

C.

ipconfig /all

D.

clear ip nat translation *

Question 34

Which of the following are the examples of administrative controls?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Data Backup

B.

Security policy

C.

Security awareness training

D.

Auditing

Question 35

Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?

Options:

A.

Eavesdropping

B.

Intrusion

C.

Dialler attack

D.

Denial of service

Question 36

You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?

Options:

A.

Reset Account Lockout Counter After policy

B.

Set Account Lockout Threshold policy

C.

Enforce Password Must Meet Complexity Requirements policy

D.

Set Account Lockout Duration policy

Question 37

Mark works as a Customer Support Technician for uCertify Inc. The company provides troubleshooting support to users. Mark is troubleshooting a computer of a user who is working on Windows Vista. The user reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center should Mark configure to save the user's data?

Options:

A.

Automatic updating

B.

Firewall

C.

Malware protection

D.

Content Advisor

Question 38

You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.

B.

Look at the Web servers logs and normal traffic logging.

C.

Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.

D.

Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.

Question 39

John works as a professional Ethical Hacker. He has been assigned a project to test the security of He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

TCP FTP proxy scanning

B.

Eavesdropping

C.

Fingerprinting

D.

Web ripping

Question 40

Which of the following best describes the identification, analysis, and ranking of risks?

Options:

A.

Design of experiments

B.

Fast tracking

C.

Fixed-price contracts

D.

Plan Risk management

Question 41

Tom and Gary are in a debate over which software should be purchased as part of their project. Gary tells Tom that because he's the senior software developer and has been with the company for 12 years, he'll be making the decision on the software. What type of conflict resolution has happened in this instance?

Options:

A.

Avoiding

B.

Forcing

C.

Compromising

D.

Smoothing

Question 42

John works as a professional Ethical Hacker. He is assigned a project to test the security of He enters a single quote in the input field of the login page of the Weare- secure Web site and receives the following error message:

Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'

This error message shows that the We-are-secure Website is vulnerable to __________.

Options:

A.

A buffer overflow

B.

An XSS attack

C.

A Denial-of-Service attack

D.

A SQL injection attack

Question 43

At which OSI layer does UDP operate?

Options:

A.

Network layer

B.

Data-link layer

C.

Session layer

D.

Transport layer

E.

Presentation layer

Question 44

John works as a professional Ethical Hacker. He has been assigned a project to test the security of John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Options:

A.

PsList

B.

Fpipe

C.

Cain

D.

PsExec

Question 45

Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

KFSensor

B.

Sheep dip

C.

Enum

D.

SocketShield

Question 46

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Options:

A.

S/MIME

B.

Asymmetric

C.

PGP

D.

Symmetric

Question 47

You are hired by Techmart Inc. to upgrade its existing network. You have prepared a case study for planning the network.

According to your study, how many domains are required to setup the network of Techmart Inc.?

(Click the Exhibit button on the toolbar to see the case study.)

Options:

A.

Two

B.

Four

C.

Three

D.

One

Question 48

Which of the following statements about Public Key Infrastructure (PKI) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a digital representation of information that identifies users.

B.

It uses asymmetric key pairs.

C.

It provides security using data encryption and digital signature.

D.

It uses symmetric key pairs.

Question 49

Peter is a merchant. He uses symmetric encryption to send confidential messages to different users of his Web site. Which of the following is the other name for asymmetric encryption?

Options:

A.

Session key encryption

B.

Public key encryption

C.

Secret key encryption

D.

Shared key encryption

Page: 1 / 33
Total 333 questions