[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GISF Dumps with VCE and PDF 121-130

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GISF
100% Free Download! 100% Pass Guaranteed!

GIAC Information Security Fundamentals

Question No: 121 – (Topic 1)

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

  1. Corrective controls

  2. Detective controls

  3. Safeguards

  4. Preventive controls

Answer: A

Question No: 122 – (Topic 1)

Which of the following statements are true about UDP?

Each correct answer represents a complete solution. Choose all that apply.

  1. UDP is an unreliable protocol.

  2. FTP uses a UDP port for communication.

  3. UDP is a connectionless protocol.

  4. TFTP uses a UDP port for communication.

  5. UDP works at the data-link layer of the OSI model.

Answer: A,C,D

Question No: 123 – (Topic 1)

You have an antivirus program for your network. It is dependent upon using lists of known viruses. What is this type of scan called?

  1. Heuristic

  2. Fixed List

  3. Dictionary

  4. Host Based

Answer: C

Question No: 124 – (Topic 1)

Which Wireless network standard operates at 2.4 GHz and transfers data at a rate of 54 Mbps?

A. 802.11a B. 802.11n C. 802.11b D. 802.11g

Answer: D

Question No: 125 – (Topic 1)

Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?

  1. American Bankers Association

  2. Central Security Service (CSS)

  3. National Institute of Standards and Technology (NIST)

  4. International Telecommunications Union

  5. Request for Comments (RFC)

  6. National Security Agency (NSA)

Answer: C

Question No: 126 – (Topic 1)

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

  1. A DNS Zone

  2. An Intranet

  3. A demilitarized zone (DMZ)

  4. A stub zone

Answer: C

Question No: 127 – (Topic 1)

Which of the following tools are used to determine the hop counts of an IP packet? Each correct answer represents a complete solution. Choose two.

  1. Netstat

  2. Ping



Answer: B,C

Question No: 128 – (Topic 1)

Under the SMART scheme, the Predictive Failure Analysis Technology is used to determine the failure or crash for which of the following parts of a computer system?

  1. Operating System

  2. Hard Disc drive

  3. Software

  4. Internet Browser

Answer: B

Question No: 129 – (Topic 1)

Which of the following books is used to examine integrity and availability?

  1. Brown Book

  2. Red Book

  3. Purple Book

  4. Orange Book

Answer: B

Question No: 130 – (Topic 1)

The Project Risk Management knowledge area focuses on which of the following processes?

Each correct answer represents a complete solution. Choose all that apply.

  1. Risk Management Planning

  2. Quantitative Risk Analysis

  3. Potential Risk Monitoring

  4. Risk Monitoring and Control

Answer: A,B,D

100% Ensurepass Free Download!
Download Free Demo:GISF Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GISF Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.